E-Commerce.

Over the past years, the inception of the Internet has profoundly changed how people buy and sell products and services. The amount of trade conduct has grown rapidly over the Internet, that it is hard to imagine conducting business without going online. The use of trade and commerce with the assistance of the Internet technology is commonly referred to as E-Commerce of electronic marketing. By definition the term E-Commerce applies to the buying and selling of products and services to accomplish business transactions through the use of electronic techniques such as the electronic mail or messaging, worldwide web, purchase cards, electronic fund transfers, electronic bulletin boards and electronic data interchange (US Department of State, 2009).
    The Pew Internet and American Life Project stated that about 66 of American adults have purchased something online, whether it is a book, clothes or even a cruise. However, if the definition of E-Commerce is extended to include the researching of both products and services over the Internet without the intention of buying, or to bid on an auction but not winning, it was found out that the number of adult participants of E-Commerce reaches to 93. Even with a slumping global economy, online retail business continue to rise (Pew Internet and American Life Project, 2008 cited in Roos, 2009). Hence, E-Commerce is indeed the new trend of doing business transactions.
    The history of E-commerce is short but truly outstanding. Within a few years, the process of networking and computing has significantly improved. As far back as 1960s, many businesses have used primitive computer networks to facilitate electronic transactions. Technologies such as electronic data interchange (EDI) allowed companies to share business documents like invoices, order forms and the likes. By 1979, the American National Standards Institute (ANSI) came up with the universal business standard of document formatting known as the ASC X12 over electronic networks.
    In 1971, Terminal Interface Processor (TIP), which was used for dialing into ARPAnet from individual computer terminals was then developed. Yet, it was in 1982 that the greatest evolution in networking was created the Transmission Control Protocol and Internet Protocol (TCPIP), the packet-switched technology that also runs the modern Internet. From  the early 1980s  use of individual computers has been introduced but were mostly accessible in major research universities only. It is also during this period that emails, listservs, newsgroups, and document sharing over networks such as BITNET and USENET were introduced. Similarly, CompuServe, which was one of the earliest and first networking services for home PC users, became popular . This system created tools such as message boards, chat rooms and emails, and established  one of the first examples of E-Commerce, a service called Electronic Mall, wherein users could directly buy items from online merchants (Smart Computing, 2009 cited in Roos, 2009).
    In 1990, Tim Berners-Lee invented the world wide web, which significantly transformed telecommunication and business networking. It should be understood that until 1991 commercial enterprising over the internet was strictly prohibited, but the National Science Foundation lifted such ban, paving way for online based e-commerce. Since then various businesses has grown incessantly over the Internet. However, it was during the 1990s that two companies were noted to have transformed the process of e-commerce Amazon and Ebay. Within the span of 15 years Amazon evolved as the most successful online bookstore, while Ebay leveled to Amazons playing field by facilitating online auctions that can be participated by people from all walks of life. Both Ebay and Amazon revolutionized how e-commerce is carried out (Roos, 2009).
    Based from the given perspectives, it can be inferred that E-Commerce indeed revolutionized the process of  product and services commercialization. The presence of the Internet along with other electronic technologies made it possible for buying and selling products and services to become faster, convenient and accessible to everyone, which can be considered as the most important developments in the field of commerce.

A Comprehensive Discussion on European Laws and Crimes on eCommerce.

John ordered a number of small items from e-Toys4U.hk for his childs birthday. The items included a game console together with several games,, a tricycle, music CDs, an e-book (compatible with his e-book reader), an iPod engraved with his childs name and a selection box of chocolates. Some items arrived a month before his childs birthday. Other items did not arrive at all. John doesnt have a telephone number to contact e-Toys4U.hk, and it is taking a few days to get a response to e-mails which he has sent demanding redress. Does John have any protection under existing rules, particularly those concerning distance contracts andor the provision of information society services, and are there any proposals for this position to change in the future

Considering the drastic growth in telecommunication technologies today   such as the internet and internet services   this decision of John to order some products online may appear quite understandable. Due to the current developments in these technologies, more and more people nowadays are spending longer hours in front of their computer screens, doing their school works, their papers for work and just simply playing some online games as past time. The rise of the internet caught the world by surprise. A lot of services and activities suddenly sprung from it, and a few years later, almost anything can already be easily done through these internet services and technologies.  These advancements have surely brought the world into a new technological era. In this generation, almost all of mans activities rely on computers and the global capabilities of the internet and the World Wide Web. In simpler terms, almost everything is becoming accessible by just one click of a button. May it be in the fields of education, governance and business, internet technologies appear to be changing a lot of processes and operations. For the field of education, there is e-learning which has already opened a lot of opportunities and possibilities for distance learning systems. In governance there what is called e-governance. This internet service allows political organizations to manage their activities and operations as well as their information resources. But aside from these fields, there dominant internet service that is already changing a lot of thing in the current contemporary society this is e-commerce. Over the years, e-commerce has become a widely known internet service which enables people to transact businesses, shop, sell and trade online. It has made a lot of business operations a lot easier and more efficient, and it is currently dominating the World Wide Web alongside other popular internet services like gaming and information search. Johns situation is a clear portrayal of an e-commerce transaction. What he did was he ordered some items, paid for it and waited for them to be delivered all through the aid of his computer and an internet connection. He did not have to go out and find the best stores to shop, rather, he transacted everything with just some clicks on his computer. This is basically the essence of e-commerce. However, considering Johns case, it can be observed that he became faced with some issues concerning the service he availed. This case shows that not in all situations do e-commerce transactions become effective and efficient. At times, it can also be associated to a lot of issues that are to be discussed in the succeeding parts of this discussion. However, firstly, the ideal of e-commerce must be understood in order to learn the nature of the internet service. By doing this, the aspects that might have affected or caused Johns dilemmas might be discovered. This will also aid in devising the possible solutions to this issue.
E-Commerce
What is E-Commerce
E-commerce has become a popular technological term in the twentieth century business world. Together with the growth of the internet and the World Wide Web, e-commerce also emerged as one of the most dominant and implicative internet services which has the capability to change and improve a lot of individual and organizations day-to-day business transactions and operations. Over the years, a lot of studies have been conducted that veer towards the understanding of this technology. These studies have created different notion on the ideal of e-commerce, however, one definition seems to appear similar among all these descriptions. Generally, e-commerce was defined as operations or processed that,
    business transactions that are conducted electronically over a computer network. It encompasses all aspects of business and marketing processes enabled by Internet and the Web technologies.  (Parsons  Oja, 2008)
Aside from this, e-commerce also encompasses the products and kind of transaction involved in delivering these products to the clients. Thus, a more in-depth description of e-commerce would have to state, that it equates processes that,
    include many kinds of physical products, digital products and services. Physical products offered at e-commerce sites include such goods as clothing, shoes, skateboards, and cars. Most of these products can be shipped to buyers through the postal service or a parcel delivery service.  (Parsons  Oja, 2008)
Considering these definitions, a simplistic ideal of what e-commerce is can easily be formed. In several ways, it appears like e-commerce is the virtual version of the typical and conventional business transaction. If in the non-virtual ideal, a person would have to walk right into a store, find a product, pay the amount and receive the product right away, in e-commerce, the buying and selling appear to be done through the aid of the electronic media. In this virtual form of selling and buying, clients just have to visit any online store which that are mostly readily available through the search engines in the internet, purchase products by looking through the online catalogs, pick a product by simply clicking buttons, pay the item through a credit card account and then the product shall be then shipped right in front of their door steps. Over the years, this technology has become a trend already. A lot of people suddenly became attracted to shopping online despite the fact that they are not actually seeing the items in person. One factor that was seen to trigger this fancy is the perceived easiness and convenience of shopping online. Through this method, people do not have to spend on gas or fares anymore since they are already given the choice to just connect to the internet, find an online store and shop without the hassles and bustles on the roads. And due to this increasing demand on e-commerce sites, a lot of studies and researches on the technologys efficiency and effectiveness have already been conducted.
In most of these studies, it was found that due to the rapid developments that were seen to occur in this technology, the range of products and services offered was also seen to expand even further. Before, e-commerce was only known for delivering items that are easy to ship. However now, due to the development in computer and internet literacy, a lot of people have already recognized the possibility that e-commerce can also touch a lot of other products and services aside from the small items. Today, it can be observed that aside from products, e-commerce also gives way to the delivery of digital products such as music tracks, videos, news, information and softwares (Parsons  Oja, 2008). What enables this possibility was the reality that these products, unlike the tangible ones do not have to be shipped or delivered anymore, but instead, they could just be easily sent through email accounts like information and messages. Another advantage that this kind of products also hold is that it can easily be received by the clients as well, since these items do not have to undergo the postal service anymore.
Aside from these products, a wide range of services have also been made possible by e-commerce. One of these innovative  business ventures are the online tutorials, online editing jobs, online postage of service requests like food delivery, home massage service and a lot of other services. This entails another advantage, but this time, on the end of the businessmen. Earlier on, it was mentioned that e-commerce does a lot if minimizing the transportation costs of clients when they go shopping. But on the other hand, it can be observed that e-commerce also promises a lot of advantages on the end of the entrepreneurs. For one, they are being given the chance to save in terms of rental fee in stalls and office spaces. Also, they are also given the opportunity to save the energy and effort they need exert in going to the store or to the office regularly to supervise the business operations and communicate with their clients personally. In e-commerce, businesses obviously do not need office spaces or stalls anymore. Through this technology, the internet becomes the venue for their virtual stores. Paying the domain fees in creating websites apparently does not appear as costly as building a store or renting a space, and aside from this, e-commerce also seems to save businessmen the energy and effort in going to and fro their shops.
In looking at the aforementioned characteristics of e-commerce, it can be observed that Johns situation clearly falls in this technology. Basically, the steps that John took in ordering and paying for the items for his childs birthday parallel the basic steps in an e-commerce transaction. It can also be observed that the online store he visited is located in Hong Kong since the website consisted of the country domain, hk which stands for the countrys initials. Considering this, it can easily be assumed that one of the primary reasons why John resorted to utilizing e-commerce was the convenience that it promises. Through this technology, he could easily purchase imported items from far off countries by just simply visiting their websites. This obviously saved him a considerable amount of money he could have spent in plane tickets. Aside from this, in looking at the online store.

A Comprehensive Discussion on European Laws and Crimes on eCommerce.

John ordered a number of small items from e-Toys4U.hk for his childs birthday. The items included a game console together with several games,, a tricycle, music CDs, an e-book (compatible with his e-book reader), an iPod engraved with his childs name and a selection box of chocolates. Some items arrived a month before his childs birthday. Other items did not arrive at all. John doesnt have a telephone number to contact e-Toys4U.hk, and it is taking a few days to get a response to e-mails which he has sent demanding redress. Does John have any protection under existing rules, particularly those concerning distance contracts andor the provision of information society services, and are there any proposals for this position to change in the future

Considering the drastic growth in telecommunication technologies today   such as the internet and internet services   this decision of John to order some products online may appear quite understandable. Due to the current developments in these technologies, more and more people nowadays are spending longer hours in front of their computer screens, doing their school works, their papers for work and just simply playing some online games as past time. The rise of the internet caught the world by surprise. A lot of services and activities suddenly sprung from it, and a few years later, almost anything can already be easily done through these internet services and technologies.  These advancements have surely brought the world into a new technological era. In this generation, almost all of mans activities rely on computers and the global capabilities of the internet and the World Wide Web. In simpler terms, almost everything is becoming accessible by just one click of a button. May it be in the fields of education, governance and business, internet technologies appear to be changing a lot of processes and operations. For the field of education, there is e-learning which has already opened a lot of opportunities and possibilities for distance learning systems. In governance there what is called e-governance. This internet service allows political organizations to manage their activities and operations as well as their information resources. But aside from these fields, there dominant internet service that is already changing a lot of thing in the current contemporary society this is e-commerce. Over the years, e-commerce has become a widely known internet service which enables people to transact businesses, shop, sell and trade online. It has made a lot of business operations a lot easier and more efficient, and it is currently dominating the World Wide Web alongside other popular internet services like gaming and information search. Johns situation is a clear portrayal of an e-commerce transaction. What he did was he ordered some items, paid for it and waited for them to be delivered all through the aid of his computer and an internet connection. He did not have to go out and find the best stores to shop, rather, he transacted everything with just some clicks on his computer. This is basically the essence of e-commerce. However, considering Johns case, it can be observed that he became faced with some issues concerning the service he availed. This case shows that not in all situations do e-commerce transactions become effective and efficient. At times, it can also be associated to a lot of issues that are to be discussed in the succeeding parts of this discussion. However, firstly, the ideal of e-commerce must be understood in order to learn the nature of the internet service. By doing this, the aspects that might have affected or caused Johns dilemmas might be discovered. This will also aid in devising the possible solutions to this issue.
E-Commerce
What is E-Commerce
E-commerce has become a popular technological term in the twentieth century business world. Together with the growth of the internet and the World Wide Web, e-commerce also emerged as one of the most dominant and implicative internet services which has the capability to change and improve a lot of individual and organizations day-to-day business transactions and operations. Over the years, a lot of studies have been conducted that veer towards the understanding of this technology. These studies have created different notion on the ideal of e-commerce, however, one definition seems to appear similar among all these descriptions. Generally, e-commerce was defined as operations or processed that,
    business transactions that are conducted electronically over a computer network. It encompasses all aspects of business and marketing processes enabled by Internet and the Web technologies.  (Parsons  Oja, 2008)
Aside from this, e-commerce also encompasses the products and kind of transaction involved in delivering these products to the clients. Thus, a more in-depth description of e-commerce would have to state, that it equates processes that,
    include many kinds of physical products, digital products and services. Physical products offered at e-commerce sites include such goods as clothing, shoes, skateboards, and cars. Most of these products can be shipped to buyers through the postal service or a parcel delivery service.  (Parsons  Oja, 2008)
Considering these definitions, a simplistic ideal of what e-commerce is can easily be formed. In several ways, it appears like e-commerce is the virtual version of the typical and conventional business transaction. If in the non-virtual ideal, a person would have to walk right into a store, find a product, pay the amount and receive the product right away, in e-commerce, the buying and selling appear to be done through the aid of the electronic media. In this virtual form of selling and buying, clients just have to visit any online store which that are mostly readily available through the search engines in the internet, purchase products by looking through the online catalogs, pick a product by simply clicking buttons, pay the item through a credit card account and then the product shall be then shipped right in front of their door steps. Over the years, this technology has become a trend already. A lot of people suddenly became attracted to shopping online despite the fact that they are not actually seeing the items in person. One factor that was seen to trigger this fancy is the perceived easiness and convenience of shopping online. Through this method, people do not have to spend on gas or fares anymore since they are already given the choice to just connect to the internet, find an online store and shop without the hassles and bustles on the roads. And due to this increasing demand on e-commerce sites, a lot of studies and researches on the technologys efficiency and effectiveness have already been conducted.
In most of these studies, it was found that due to the rapid developments that were seen to occur in this technology, the range of products and services offered was also seen to expand even further. Before, e-commerce was only known for delivering items that are easy to ship. However now, due to the development in computer and internet literacy, a lot of people have already recognized the possibility that e-commerce can also touch a lot of other products and services aside from the small items. Today, it can be observed that aside from products, e-commerce also gives way to the delivery of digital products such as music tracks, videos, news, information and softwares (Parsons  Oja, 2008). What enables this possibility was the reality that these products, unlike the tangible ones do not have to be shipped or delivered anymore, but instead, they could just be easily sent through email accounts like information and messages. Another advantage that this kind of products also hold is that it can easily be received by the clients as well, since these items do not have to undergo the postal service anymore.
Aside from these products, a wide range of services have also been made possible by e-commerce. One of these innovative  business ventures are the online tutorials, online editing jobs, online postage of service requests like food delivery, home massage service and a lot of other services. This entails another advantage, but this time, on the end of the businessmen. Earlier on, it was mentioned that e-commerce does a lot if minimizing the transportation costs of clients when they go shopping. But on the other hand, it can be observed that e-commerce also promises a lot of advantages on the end of the entrepreneurs. For one, they are being given the chance to save in terms of rental fee in stalls and office spaces. Also, they are also given the opportunity to save the energy and effort they need exert in going to the store or to the office regularly to supervise the business operations and communicate with their clients personally. In e-commerce, businesses obviously do not need office spaces or stalls anymore. Through this technology, the internet becomes the venue for their virtual stores. Paying the domain fees in creating websites apparently does not appear as costly as building a store or renting a space, and aside from this, e-commerce also seems to save businessmen the energy and effort in going to and fro their shops.
In looking at the aforementioned characteristics of e-commerce, it can be observed that Johns situation clearly falls in this technology. Basically, the steps that John took in ordering and paying for the items for his childs birthday parallel the basic steps in an e-commerce transaction. It can also be observed that the online store he visited is located in Hong Kong since the website consisted of the country domain, hk which stands for the countrys initials. Considering this, it can easily be assumed that one of the primary reasons why John resorted to utilizing e-commerce was the convenience that it promises. Through this technology, he could easily purchase imported items from far off countries by just simply visiting their websites. This obviously saved him a considerable amount of money he could have spent in plane tickets. Aside from this, in looking at the online store.

Customer Relationship Management Silver bullet or poison chalice.

Poison chalice is a business term used to describe a deceitful decision. The term silver bullet means a simple but effective solution given to a complex problem (Reynolds 200245). Both words in customer relationship management sprung from the notion that The customer is always right. Both words are used to contradict the importance of customer relationship management. The term silver bullet compares customer relationship management to a silver bullet literally. A silver bullet if aimed well can be used to bring down any animal no matter the size. Roger, Zerres, Zerres (2007) discuss how effective CRM can be to a business. In relation, CRM strategies if well implemented can provide an effective solution to a big problem. Poison chalice defines something perceived to be good but it really is poisonous. Another name for poison chalice is poison ivy.
Customer service relationship as a silver bullet
            This term identifies and applauds the need for customer relationship management (CRM) in business. As a silver bullet, it implies that the adoption of CRM strategies in business can lead to great changes in the overall revenue projections. In todays business environment, it is very difficult to thrive on product alone (Newell 200345). This calls for the employment of other factors to complete the cycle which includes the practice of business ethics, capturing and respecting customers preferences and setting the business focus on the individual customer. In employing CRM, a business needs first to analyze the intended objectives (Romano 200165). Customer relationship management provides strategic advantages in organizing and personalizing relationships with the esteemed customers. CRM systems give business strategic advantages. This removes the need of a certain employee for a certain customer because of hisher relationship with the customer.
             Using CRM helps keep profile of the needs of different customers. This helps in informing the employees on how to address those needs effectively while maintaining the customer. If need calls for change of the strategies, CRM helps the management in formulating new methods to be used. CRM improves the degree of responsiveness hence building customer loyalty (Ngai 200588). Customer relationship management calls for the use of suggestion boxes or any other desired customer feedback methods. Customer feedback helps determine the level of customer satisfaction. If negative feedback is received then this calls for ratification of the already existing methodologies to fit the needs addressed by the customer. A positive feedback does not call for relaxation but calls for more hard work. CRM strategies serve as a guideline in establishing sales strategies and marketing campaigns (Muther 200121). CRM strategies are not supposed to focus on retaining the customers but on retention. A companys efforts in sales should be focused on attracting a target customer. This usually applies with firms that keep few but highly rewarding clients like consultancy firms and banks. Such companies should strategize themselves to offer that client the services one cannot get from any other service provider. The firm should always retain a competitive edge to keep ahead of their competitors. Assion, Limayen (2004) discuss how a company should employ the strategies of CRM. The objectives of the business may be retaining the existing clients, looking for new clients or even both. CRM stresses that a customers purchasing decision is influenced by past experiences (Janice 200245). CRM strategies if well implemented can yield effective results. Current researches carried by the international public relations body showed that in a group of ten firms both applying customer relationship management eight of them come out successful. This is a proof that CRM really works.
Customer service relationship as poison chalice
This implies that CRM strategies may not as well be promising. It is not guaranteed that adopting CRM practices will lead to success. CRM strategies should be accompanied with a detailed plan on how to execute them. If these strategies are not well implemented then negative results are experienced. A business should identify all other factors needed in order to succeed. Establishing a good customer relationship alone will not increase sales (Donoghue 200965). Quality, advertising and pricing are some of the factors strategic managers need to employ in line with CRM. A customer will not retain hisher loyalty in a company that has friendly staff but their prices are high. Instead the customer will be willing to go where the prices are low irregardless of their customer service. Monitoring the needs of customers will not alone build customer loyalty. The attitude of the sales clerk while dealing with the customer also counts (Sharp 200035). The image of the company is portrayed by the attitude demonstrated by the sales clerks. This states that the heart of a company lies on the hands of the people who handle it and not the strategies or the technology improvised.
Case study
An example demonstrating CRM as both poison chalice and silver bullet is the case of Radisson hotels and resorts (Bruce 2004 24). This major hotel chain was losing share quickly. After a few board meetings they decided to lay down two initiatives for customer relation management. Those could be the establishment of common franchising suite and an improved system of data management. This process management to revitalize the condition of the company but not the stability did not last for long. In the early 1990s the group was scrambling again. The methods were not effective and this time the management went back to drawing table. They took into account the process of educating the managers, harmonizing the marketing and IT department (Bruce 2004 25). These strategies were incorporated with the earlier ones. Those strategies performed miracles for the chain group. Cases of losing customers were buried down under.

A Comprehensive Discussion on European Laws and Crimes on eCommerce.

John ordered a number of small items from e-Toys4U.hk for his childs birthday. The items included a game console together with several games,, a tricycle, music CDs, an e-book (compatible with his e-book reader), an iPod engraved with his childs name and a selection box of chocolates. Some items arrived a month before his childs birthday. Other items did not arrive at all. John doesnt have a telephone number to contact e-Toys4U.hk, and it is taking a few days to get a response to e-mails which he has sent demanding redress. Does John have any protection under existing rules, particularly those concerning distance contracts andor the provision of information society services, and are there any proposals for this position to change in the future

Considering the drastic growth in telecommunication technologies today   such as the internet and internet services   this decision of John to order some products online may appear quite understandable. Due to the current developments in these technologies, more and more people nowadays are spending longer hours in front of their computer screens, doing their school works, their papers for work and just simply playing some online games as past time. The rise of the internet caught the world by surprise. A lot of services and activities suddenly sprung from it, and a few years later, almost anything can already be easily done through these internet services and technologies.  These advancements have surely brought the world into a new technological era. In this generation, almost all of mans activities rely on computers and the global capabilities of the internet and the World Wide Web. In simpler terms, almost everything is becoming accessible by just one click of a button. May it be in the fields of education, governance and business, internet technologies appear to be changing a lot of processes and operations. For the field of education, there is e-learning which has already opened a lot of opportunities and possibilities for distance learning systems. In governance there what is called e-governance. This internet service allows political organizations to manage their activities and operations as well as their information resources. But aside from these fields, there dominant internet service that is already changing a lot of thing in the current contemporary society this is e-commerce. Over the years, e-commerce has become a widely known internet service which enables people to transact businesses, shop, sell and trade online. It has made a lot of business operations a lot easier and more efficient, and it is currently dominating the World Wide Web alongside other popular internet services like gaming and information search. Johns situation is a clear portrayal of an e-commerce transaction. What he did was he ordered some items, paid for it and waited for them to be delivered all through the aid of his computer and an internet connection. He did not have to go out and find the best stores to shop, rather, he transacted everything with just some clicks on his computer. This is basically the essence of e-commerce. However, considering Johns case, it can be observed that he became faced with some issues concerning the service he availed. This case shows that not in all situations do e-commerce transactions become effective and efficient. At times, it can also be associated to a lot of issues that are to be discussed in the succeeding parts of this discussion. However, firstly, the ideal of e-commerce must be understood in order to learn the nature of the internet service. By doing this, the aspects that might have affected or caused Johns dilemmas might be discovered. This will also aid in devising the possible solutions to this issue.
E-Commerce
What is E-Commerce
E-commerce has become a popular technological term in the twentieth century business world. Together with the growth of the internet and the World Wide Web, e-commerce also emerged as one of the most dominant and implicative internet services which has the capability to change and improve a lot of individual and organizations day-to-day business transactions and operations. Over the years, a lot of studies have been conducted that veer towards the understanding of this technology. These studies have created different notion on the ideal of e-commerce, however, one definition seems to appear similar among all these descriptions. Generally, e-commerce was defined as operations or processed that,
    business transactions that are conducted electronically over a computer network. It encompasses all aspects of business and marketing processes enabled by Internet and the Web technologies.  (Parsons  Oja, 2008)
Aside from this, e-commerce also encompasses the products and kind of transaction involved in delivering these products to the clients. Thus, a more in-depth description of e-commerce would have to state, that it equates processes that,
    include many kinds of physical products, digital products and services. Physical products offered at e-commerce sites include such goods as clothing, shoes, skateboards, and cars. Most of these products can be shipped to buyers through the postal service or a parcel delivery service.  (Parsons  Oja, 2008)
Considering these definitions, a simplistic ideal of what e-commerce is can easily be formed. In several ways, it appears like e-commerce is the virtual version of the typical and conventional business transaction. If in the non-virtual ideal, a person would have to walk right into a store, find a product, pay the amount and receive the product right away, in e-commerce, the buying and selling appear to be done through the aid of the electronic media. In this virtual form of selling and buying, clients just have to visit any online store which that are mostly readily available through the search engines in the internet, purchase products by looking through the online catalogs, pick a product by simply clicking buttons, pay the item through a credit card account and then the product shall be then shipped right in front of their door steps. Over the years, this technology has become a trend already. A lot of people suddenly became attracted to shopping online despite the fact that they are not actually seeing the items in person. One factor that was seen to trigger this fancy is the perceived easiness and convenience of shopping online. Through this method, people do not have to spend on gas or fares anymore since they are already given the choice to just connect to the internet, find an online store and shop without the hassles and bustles on the roads. And due to this increasing demand on e-commerce sites, a lot of studies and researches on the technologys efficiency and effectiveness have already been conducted.
In most of these studies, it was found that due to the rapid developments that were seen to occur in this technology, the range of products and services offered was also seen to expand even further. Before, e-commerce was only known for delivering items that are easy to ship. However now, due to the development in computer and internet literacy, a lot of people have already recognized the possibility that e-commerce can also touch a lot of other products and services aside from the small items. Today, it can be observed that aside from products, e-commerce also gives way to the delivery of digital products such as music tracks, videos, news, information and softwares (Parsons  Oja, 2008). What enables this possibility was the reality that these products, unlike the tangible ones do not have to be shipped or delivered anymore, but instead, they could just be easily sent through email accounts like information and messages. Another advantage that this kind of products also hold is that it can easily be received by the clients as well, since these items do not have to undergo the postal service anymore.
Aside from these products, a wide range of services have also been made possible by e-commerce. One of these innovative  business ventures are the online tutorials, online editing jobs, online postage of service requests like food delivery, home massage service and a lot of other services. This entails another advantage, but this time, on the end of the businessmen. Earlier on, it was mentioned that e-commerce does a lot if minimizing the transportation costs of clients when they go shopping. But on the other hand, it can be observed that e-commerce also promises a lot of advantages on the end of the entrepreneurs. For one, they are being given the chance to save in terms of rental fee in stalls and office spaces. Also, they are also given the opportunity to save the energy and effort they need exert in going to the store or to the office regularly to supervise the business operations and communicate with their clients personally. In e-commerce, businesses obviously do not need office spaces or stalls anymore. Through this technology, the internet becomes the venue for their virtual stores. Paying the domain fees in creating websites apparently does not appear as costly as building a store or renting a space, and aside from this, e-commerce also seems to save businessmen the energy and effort in going to and fro their shops.
In looking at the aforementioned characteristics of e-commerce, it can be observed that Johns situation clearly falls in this technology. Basically, the steps that John took in ordering and paying for the items for his childs birthday parallel the basic steps in an e-commerce transaction. It can also be observed that the online store he visited is located in Hong Kong since the website consisted of the country domain, hk which stands for the countrys initials. Considering this, it can easily be assumed that one of the primary reasons why John resorted to utilizing e-commerce was the convenience that it promises. Through this technology, he could easily purchase imported items from far off countries by just simply visiting their websites. This obviously saved him a considerable amount of money he could have spent in plane tickets. Aside from this, in looking at the online store.
With the advents of ubiquitous information systems that are decentralised in nature, education can now be transmitted in real time mode globally. Globalization as a phenomenon is truly transforming the way business is executed, and in any case beyond borders. Almost all disciplines are relentlessly inclined to changing their organizational structures by integrating information systems, mainly as a pedagogy through which most corporate entities can gain a competitive edge and dominate the global market. As such institutions of higher learning have not been outpaced by this ever changing world of technology. E-learning model has been engineered to facilitate education that has no respect for regions, yet support versatility as well as diversity. Irrespective of the positive side of E-learning, the platforms also exhibit the ugliest part of the coin security assaults. Indemnity remains the worst nightmare of electronic modes of erudition. Since the internet supports millions of entities with thousands of millions of information servers, authenticity becomes the bone of contention in this paper. Nevertheless, there are myriad precautionary standards for curtailing electronic industry, and yet diminutive concentration has been afforded to the e-learning security dimensions. On the extreme end, the corporate world has initiated devices into structures to preclude security themes. The publishing entities are installing e-learning security measures with the ability to control wicked system intrusion whether interiorly or exteriorly. On top of that, global standards have been approved to highlight indemnity complexities. Fastidious measures like the establishment of AvsecSchool.com were unavoidably proposed, specifically to train workers and other relevant stakeholders about the security measures of the e-industry. In this regard this paper endeavours to outline, privacy as well as security themes associated with electronic erudition, Perkins, et. al. (2003).

2.0 Literature review
2.1 Metro-WiFi unrestricted admittance Dangers 
These dangers depend on the installed mesh artifacts and the configuration admittance stratagem for the wireless machinist. Mesh structures that present free public admittance are predisposed to harassment slanting on the proposition of open verification.

Spoofing virtual systems this is an attack that exploits a malevolence twin to carry out content discovery danger. In an institution, deployment of such attacks is prohibited by using EAP techniques that develop mutual substantiations flanking a client as well as the road and rail network.

Denial-of-service assault An assault might either employ IP deluge and also configuration utility assault, if not 802.11 MAC managerial assaults. The 802.11i is link centered indemnity model that supports authentication, prime allotment as well as encryption for lattice control frames, where MAC administrative framework precautions is not dealt with within 802.11s.

Pilfering-of-service hit. This is an attack that embezzles legitimate user recommendations or executes paid-user convention requisition. Most WiFi structures employ a tune-up gateway or caged threshold to make safe paid right of entry.  A cage threshold supports SSL-protected Web pages in the sense that students endorsement permit is queried. When the credentials are approved, the caged threshold approves the client to system admittance by cataloging the compelling punter MAC as well as IP address in the entryway. On the other hand, wicked users might convey a transfer athwart the interlock configuration without navigating a system entryway. These attacks do not represent any modern threat for mesh network relative to mainstream WiFi hotspot services.  Nevertheless, mesh configuration for municipal wireless has extended the probable possibility of usage and accessibility of public right of entry networks, Perkins, et. al. (2003).

2.2 Physical Security Threats
Traditional wireless system deployments are within an enterprise background with substantial and administrator control of the machinist or agency. Open-air wirelesses interlock arrangement that the lattice admittance points be exterior the corporeal management of the operator, characteristically in environments that are dependable

Open air consumption pose more challenge for corporal appliance protection. Wireless mesh access points are mounted locally on light-posts or externally on structural edifices, where wide-area exploitation might have myriad of thousands such mechanisms in a milieu that is not within the physical and proprietor management of the system machinist, Yih-Chun Hu, et . al., (2004).

2.3 Wireless Intrusion Detection Limitations
Incursion exposure has become a feasible way of identifying dangers in conflict to codeless systems. Since the 802.11 medium admittance control expertise is susceptible to denial-of-service attacks, and was the probability of parody valid admittance points, wireless interruption configurations have presented defense through detection of wireless configuration assaults, Perkins, et. al. (2003). Nonetheless, wide-expanse codeless interlock structures present wireless invasion exposures rather intricate owing to the disseminated geographic circulation of cordless nodules. For instance, any 802.11MAC administration susceptibilities are purely addressed through recognition rather than deterrence. In this case, cordless invasion recognition antennas are mostly employed in enterprise cordless structures to recognize common 802.11 attacks, consisting MAC administrative assaults and also wicked twin as well as rascal AP assaults. Open verification would basically connote precincts on configurations approval. Cordless invasion recognition sensors are most proficiently installed indoors, meticulously in a secured corporeal backdrop, where cordless IDS replicas to spatial expanse outdoors installation protracted is not realistic.

Incorporated hazard recognition this are lattice admittance points that present incorporated recognition as well as prevention management for cordless dangers will superlatively enlist the security dangers, Milanovic, N., et al (2007).

3.0 Model
3.1 Dangers and Vulnerability
3.1.1 Course-plotting Protocol bullying

Codeless mess configurations might be vulnerable to course plotting protocol hazards as well as route interference dangers. Most of these dangers need package insertion that supports dedicated information of the map-reading etiquette nevertheless, these hazards are idiosyncratic to cordless mesh constitutions and are summed-up as follows.

Back-hole this is an imposition that constructs forged packs to mimic a convincing interlock nodule and consequently drop packs, where attracting packs entails promotion conduits as inexpensive  
Grey-hole this is an attack which creates packs to molest and selectively drop conduits or inspects multifarious interchange.

Worm-Hole this is where, course-plotting management messages are replayed from individual network position to another, this can severely disorients course plotting. 

Itinerary fault insertion this is where a systems invader disorients course-plotting by inserting fictitious route error message to break lattice interlinks. Comparative to the other map reading attacks, this hit imaginably has elevated exploitability since it does not demand comprehensive information of the routing protocol state replica. The dangers related with these hazards are implanted on the course finding expertise or mesh network construction, Milanovic, N., et al (2007).

In a mesh configuration, threats might vary exponentially- a structure inclined on a recognized protocol such as AODV is extra vulnerable than a proprietary map-finding principle. Correspondingly, a lattice infrastructure that supports content integrity scrutiny for course-plotting texts as well as device substantiation will significantly diminish the peril risk. In this case, X 509v3-oriented trust or exceptional per hop indemnity as per 802.11s presents greater security than basic security administration like the composition- spacious collective inputs). These types of attacks are quite fascinating dissimilar to denial-of-service assaults inherent on 802.11 MAC systems. Also, the use of RF interference, mesh disruption assault have the propensity to create service deprivation outside the reach of a distinct hateful transceiver, Yih-Chun Hu, et. al., (2004).

4.0 Methodology
4.1 Investigating and assessing Security Management

For those users who experience problems like red flags in the system testing as well as assessing will be redone to ensure protection of their work. The system resumes to operating properly with no red flags no amendments will be on the system however, many problems will depict additional protection appraisal such as learners submitting the assignment concurrently to ensure the server to handle normal congestion. 4.2 Merging security management with business objectivesThis involves assigning learners homework to control overworking the teacher with grading and robotically rank the learners immediately they submit their work through the system. However, this approach encourages cheating and reducing the number of submission on a daily basis will deny hard-working learners to learn from their mistakes during submission. In addition, this mode of practice is cost efficiency in security management. Even though, flaws exist but avoiding them will not be beneficial, hence, it is important to evaluating the red flags to determine the need for more safety measures. For example, if learners perform well in homework and poorly in end semester exams and no proof for cheating then there is no relevance of integrating more precautionary measures, Yih-Chun Hu, et. al., (2004).

4.3 Arresting Learners User Names, Passwords, Credit Card Numbers,  Expiration Dates
The market has innumerable inner as well as exterior hardware and programs that can record or even trap keystrokes. These programs have the ability to pile up a documentation of what the user keystroke and making it accessible through the email, website or record on a hardware mechanism.  Prices for this programs span from roughly 100 dollars to 500 dollars and supports the capacity to capture millions of keystrokes with feature that support foreign languages. Most of these appliances are not coded and can relay information in a synchronized mode. Owing to the fact that countless university digital libraries place their workstations to prohibit students from mounting or dismounting programs, most of the keystroke logger program softwares might not function. Nevertheless, that still does not preclude the hardware register from functioning. This is to say, individuals who know when classes are beginning in the digital lab, can run external logger appliances before the class sets off, then capture the statistics entries, and then after the exit of the class reap the clandestine information.  However, simple this might be in terms of intrusion, the malicious move can be precluded by enclosing the PC in a sealed cabinet while exposing only the part of the keyboard, record, and disk drive the users ought to access. Nevertheless, this is to expensive for most academic entities and as such, most remain susceptible, Milanovic, N., et al (2007).

5.0 Recommendations
Presenting security proposals might seem rather myopic and factitious since assaults are composite to expect and might often utilize formerly unfamiliar susceptibility. 

In the end, proper execution as well as controlling of security measures and preeminent performances for cordless admittance restrictions, are supposed to mitigate dangers related with assaults opposing system accessibility or user confidentiality and privacy, Perkins, et. al. (2003). Protecting of cordless configurations should always be treated carefully, mainly owing to the intrinsic trust inequality in a cordless lattice as well as mainstream restrictions in 802.11 MAC fortifications. Cordless lattice structures amplify these brave-ups, in the sense that such structures now protract outside the corporeal management of the machinist and easily accessible open structures present functions for malicious practices that contrary to the credulous as well as unskillful end-users. The 802.11 cordless Denial-of-service medium, also by means of MAC pack insertion or other conduits, remains the primary worry connected to wireless arrangement, Jones, D. (2006).

5.1 Wireless precaution check by means of a routine control
For a spacious area outdoor cordless lattice, configurations, explicit wireless interruption recognition explorations are not practicable, where incorporated and smart hazard recognition and administration ought to be incorporated into the wireless lattice admittance terminals.  At the same time, lattice routine administration metrics as well as pointers should be controlled to prepare machinist to prospective denial-of-service assaults. Most lattice configuration artifacts and structures present performance management structure that center on optimizations for lattice course-finding algorithms and as such alert machinists to prospective interference complexities in unsecured groups. With fitting element administrative line of attacks, properly interpreted practice control information could be employed to illustrate signatories of most denial-of-service assaults, Xia, H., et. Al. (2006).


5.2 Data-center protected system design

Owing to the massive production of municipal wireless lattice employing lattice-configuration expertise, machinists ought to consider securing their information hubs as well as inter-linking main configurations. Firewalls, service gateways as well as wireless functional segregated protocols to empower wireless admittance controls should in any case be deployed regardless of the superlative 802.11i oriented lattice protection the cordless infrastructure will nevertheless be treated as a suspicious system section, Jones, D. (2006).

5.3 Information surge management
The e-commerce scenario for cordless lattice structures is inclined on collective network functionality with amalgamations of public admittance as well as protected restricted configuration which connotes the urgency for meticulous designed secure system design to approve and differentiate end users. Regardless of the ability to enforce myriad concurrent cordless security guiding principles in the lattice system, myriad bureaus sharing this municipal lattice might demand VPN entryway admittance to their restricted systems. When employing VLANSSID centered segregation as well as protection guiding principles, packet filtering as well as admittance management ought to be employed at the end user edge of the mesh configuration as a defense- detailed line of attack. In the end, implemented interchange flanking the cordless punters and designated entryway can preclude network malicious intrusion of a cordless lattice system, Xia, H., et. Al. (2006).

6.0 Laws and Policies for Security Control
A comprehensive documentation of edicts as well as management structures, operations, administration in addition to maintenance could be employed to enhance particular security themes. This could be avoided, for instance, during a take-home case-study exam. One of the policies on executive structures, functions, management as well as continuation of this coordination is the execution of a stationary indiscriminate integer initiator for anomalies as well as clarifications. The motionless arbitrary integer engendered anomalies as well as clarifications to ascertain that learners acquire a unique class of numbers in the anomaly and its result. This contains the issue of learners copying and pasting answers from their colleagues, claiming credit where its not due. Conversely, the structure is still defenceless to replication and pasting of the prescriptions this ascertains that regardless of what the integers are, on condition that the principle is accurate the learners will be in a position to cheat and escape Scot free. To curtail the propensity of cheating among students requires the execution of arbitrary integer creation of the principles, making it rather complex and time-wasting to facsimile and replicate principles from one learner to the other. In short, after reviewing the precautions and structures administration of electronic distributing Internet Servers, highlighting various red flag security threats and executing an outlay benefit line of attack.  Myriad issues have been scheduled and sophisticated conjectures that it could be all a role of cost promotion scrutiny. Precisely, this simply an aspect of cost conceived uncertainty, Balacheff, B., et al. (2002).


7.0 Conclusion
The omnipresent nature of the internet makes it rather complex, for security measures to be absolutely realised since the infrastructure supports millions of users.  In the case of e-learning, students are more likely to hamper the smooth functioning of server hence slowing its performance through overloads trying to access significant information simply for the reason that they have to meet deadlines.  Malicious assailants would also want to intrude the system for uncalled for reasons. As such important information for diverse establishments might be at risk if resolute measures are not put in place to preclude al this. In this paper we enlisted various counter attack measures as well as the institution of a comprehensive policy structure that would be employed to secure the cyber space, Balacheff, B., et al. (2002).

Outsourcing to India

This video showcases various perspectives on outsourcing off shoring to India. Some speculate that outsourcing to India has a positive impact to Indian community but some consider the downside as well. In the interview conducted in this video, Indians have shown full interest and desire to apply for business process outsourcing companies. It was stated that hundreds of applicants persevere to get hired everyday. One of the interviewees, 21 yrs old whos very passionate on her work as a call center agent, expressed her opinion on this matter. Shes happy to earn money more than what she expects to earn anywhere else. Outsourcing is an easy source of money for them. They enjoy the work while earning good income. Some consider outsourcing as a great opportunity for Indians to widen sources of income the pay is relatively high and it offers high technology advantage.
Some view outsourcingoff shoring boom as a threat to Indias cultural development. These people seem to have strong negligence of seeking help from other cultures. They fear that globalization will create dependency on western countries in the long run and they dont like it to happen. They admit that at present time, these outsourcing off shoring boom are providing employment opportunities to India but they think that this phenomenon will eventually give socio-cultural damages.  It was seen on the video that Indians are not only required to learn the technical aspect of the product but they are also taught to actually mimic how the Americans speak their culture and lifestyle to be able to deliver quality customer service that the company needs to produce. Another concern is that there are some rural areas which are being left behind because of globalization.  Livelihood of locals can be damaged and soon enough, people will need to dance with the current flow of society which makes it harder for the rural areas to cope up. They want their own society to live as it is and produce sustainable quality of life in their own ideal way.
Many Americans are contesting outsourcing to India and perhaps many are thinking that this is destroying American workers job opportunities.  But several scenes in the video suggest that off shoring boom in India is not an entirely negative development for the United States.   In reality, US companies are saving large amount of dollars from investing outsourcing to India. This is because outsourcing is cost-effective it maximizes Business Process Outsource companies revenue and minimizes expenses without compromising services with the same level of quality .Americans need not worry about outsourcing jobs that has previously been designed for them. US government surely will always find a way to create new jobs for them. As outsourcing companies continue to invade India, the increased demand for equipments used to design high-technology institutions can be manifested. It was noticeable that equipments such as computers, gadgets, chairs, etc are being purchased from the US.
Globalization (or globalisation) describes an ongoing process by which regional economies, societies, and cultures have become integrated through a globe-spanning network of communication and execution. The term is sometimes used to refer specifically to economic globalization the integration of national economies into the international economy through trade, foreign direct investment, capital flows, migration, and the spread of technology (Bhagwati, 2004).  One example of Indian culture in a modern world is Krishna project. Krishna project is an Indian animated film that portrays local culture and Indian arts at its best. The film has high technology effects brought by the modern society. But when you take a deeper look, it still preserves the Indian culture and ways of living the characters resemble Indians faces and distinctions. This is an amazing example of how recent technologies help preserve historical inclination of India. 
Friedman suggests that the Indian outsourcingoff shoring industry played a role in preventing an acceleration of hostilities, or even a war, between India and Pakistan.  Outsourcingoff shoring, I can say, is part of globalization. Many countries are focusing on how to acquire and cope up with the modern world.  We have collective interests in fulfilling an ideal society. Pakistan and India might see outsourcing as a great approach to stabilize their own country instead of accelerating warfare which creates destruction of peace and order. War between India and Pakistan can be prevented perhaps because Friedman believes that we all want to make the world a safer place to live.
If Ban Ki-moon is going to ask advice from me in regard to this issue, I would propose that no need for the international community to take necessary actions to minimize or eliminate outsourcing.  I have to treat outsourcing boom in a positive light. If we get to weigh the situation, advantages of off shoring are more evident than its downsides. Many lives have been improved. What we should do, instead, is to empower locals and develop the community without altering cultural distinction. People need to accept the fact that the world is constantly changing and this course is affecting everybody. The challenge is how to cope with these changes. What United Nation can do is to think of ways on how to sustain localization at its best for the modern world.
The most interest thing in this video is people have their own notion about this phenomenon they seem to critically examine the future of todays world. This made me think that we dont just sit and watch the world conspires right before our very eyes. We continuously seek for preservation of our own cultural society we have the sense of urgency which makes me more assured that we all want a place where everybody shares a common goal. Some argues just to prove their point but the important thing is to unleash brilliant ideas for sustainable development our nation.