<s>
Electronic	B-Application
business	I-Application
(	O
also	O
known	O
as	O
online	B-Application
business	I-Application
or	O
e-business	B-Application
)	O
is	O
any	O
kind	O
of	O
business	O
or	O
commercial	O
transaction	O
that	O
includes	O
sharing	O
information	O
across	O
the	O
internet	O
.	O
</s>
<s>
Electronic	O
commerce	O
focuses	O
on	O
the	O
use	O
of	O
information	B-General_Concept
and	I-General_Concept
communication	I-General_Concept
technology	I-General_Concept
to	O
enable	O
the	O
external	O
activities	O
and	O
relationships	O
of	O
the	O
business	O
with	O
individuals	O
,	O
groups	O
,	O
and	O
other	O
businesses	O
,	O
while	O
e-business	B-Application
refers	O
to	O
business	O
with	O
help	O
of	O
the	O
internet	O
.	O
</s>
<s>
Electronic	B-Application
business	I-Application
differs	O
from	O
electronic	O
commerce	O
as	O
it	O
does	O
not	O
only	O
deal	O
with	O
online	O
transactions	O
of	O
selling	O
and	O
buying	O
of	O
a	O
product	O
and/or	O
service	O
but	O
also	O
enables	O
to	O
conduct	O
of	O
business	O
processes	O
(	O
inbound/outbound	O
logistics	O
,	O
manufacturing	O
&	O
operations	O
,	O
marketing	O
and	O
sales	O
,	O
customer	O
service	O
)	O
within	O
the	O
value	O
chain	O
through	O
internal	O
or	O
external	O
networks	O
.	O
</s>
<s>
The	O
term	O
"	O
e-business	B-Application
"	O
was	O
coined	O
by	O
IBM	O
's	O
marketing	O
and	O
Internet	O
team	O
in	O
1996	O
.	O
</s>
<s>
Electronic	B-Application
business	I-Application
can	O
take	O
place	O
between	O
a	O
very	O
large	O
number	O
of	O
market	O
participants	O
;	O
it	O
can	O
be	O
between	O
business	O
and	O
consumer	O
,	O
private	O
individuals	O
,	O
public	O
administrations	O
,	O
or	O
any	O
other	O
organizations	O
such	O
as	O
NGOs	O
.	O
</s>
<s>
There	O
are	O
nine	O
possible	O
combinations	O
for	O
electronic	B-Application
business	I-Application
relationships	O
.	O
</s>
<s>
B2C	O
and	O
B2B	O
belong	O
to	O
E-commerce	O
,	O
while	O
A2B	O
and	O
A2A	O
belong	O
to	O
the	O
E-government	O
sector	O
which	O
is	O
also	O
a	O
part	O
of	O
the	O
electronic	B-Application
business	I-Application
.	O
</s>
<s>
One	O
of	O
the	O
founding	O
pillars	O
of	O
electronic	B-Application
business	I-Application
was	O
the	O
development	O
of	O
the	O
Electronic	O
Data	O
Interchange	O
(	O
EDI	O
)	O
electronic	O
data	O
interchange	O
.	O
</s>
<s>
Amazon	B-Application
,	O
which	O
launched	O
in	O
1995	O
,	O
started	O
as	O
an	O
online	O
bookstore	O
and	O
grew	O
to	O
become	O
nowadays	O
the	O
largest	O
online	O
retailer	O
worldwide	O
,	O
selling	O
food	O
,	O
toys	O
,	O
electronics	O
,	O
apparel	O
and	O
more	O
.	O
</s>
<s>
Other	O
successful	O
stories	O
of	O
online	O
marketplaces	O
include	O
eBay	B-Application
or	O
Etsy	O
.	O
</s>
<s>
In	O
1994	O
,	O
IBM	O
,	O
with	O
its	O
agency	O
Ogilvy	O
&	O
Mather	O
,	O
began	O
to	O
use	O
its	O
foundation	O
in	O
IT	O
solutions	O
and	O
expertise	O
to	O
market	O
itself	O
as	O
a	O
leader	O
of	O
conducting	O
business	O
on	O
the	O
Internet	O
through	O
the	O
term	O
"	O
e-business.	O
"	O
</s>
<s>
After	O
conducting	O
worldwide	O
market	O
research	O
in	O
October	O
1997	O
,	O
IBM	O
began	O
with	O
an	O
eight-page	O
piece	O
in	O
The	O
Wall	O
Street	O
Journal	O
that	O
would	O
introduce	O
the	O
concept	O
of	O
"	O
e-business	B-Application
"	O
and	O
advertise	O
IBM	O
's	O
expertise	O
in	O
the	O
new	O
field	O
.	O
</s>
<s>
IBM	O
decided	O
not	O
to	O
trademark	O
the	O
term	O
"	O
e-business	B-Application
"	O
in	O
the	O
hopes	O
that	O
other	O
companies	O
would	O
use	O
the	O
term	O
and	O
create	O
an	O
entirely	O
new	O
industry	O
.	O
</s>
<s>
However	O
,	O
this	O
proved	O
to	O
be	O
too	O
successful	O
and	O
by	O
2000	O
,	O
to	O
differentiate	O
itself	O
,	O
IBM	O
launched	O
a	O
$300	O
million	O
campaign	O
about	O
its	O
"	O
e-business	B-Application
infrastructure	O
"	O
capabilities	O
.	O
</s>
<s>
Since	O
that	O
time	O
,	O
the	O
terms	O
,	O
"	O
e-business	B-Application
"	O
and	O
"	O
e-commerce	O
"	O
have	O
been	O
loosely	O
interchangeable	O
and	O
have	O
become	O
a	O
part	O
of	O
the	O
common	O
vernacular	O
.	O
</s>
<s>
The	O
transformation	O
toward	O
e-business	B-Application
is	O
complex	O
and	O
in	O
order	O
for	O
it	O
to	O
succeed	O
,	O
there	O
is	O
a	O
need	O
to	O
balance	O
between	O
strategy	O
,	O
an	O
adapted	O
business	O
model	O
(	O
e-intermediary	O
,	O
marketplaces	O
)	O
,	O
right	O
processes	O
(	O
sales	O
,	O
marketing	O
)	O
and	O
technology	O
(	O
Supply	O
Chain	O
Management	O
,	O
Customer	O
Relationship	O
Management	O
)	O
.	O
</s>
<s>
When	O
organizations	O
go	O
online	O
,	O
they	O
have	O
to	O
decide	O
which	O
e-business	B-Application
models	O
best	O
suit	O
their	O
goals	O
.	O
</s>
<s>
The	O
concept	O
of	O
the	O
e-business	B-Application
model	O
is	O
the	O
same	O
but	O
used	O
in	O
online	O
presence	O
.	O
</s>
<s>
E-business	B-Application
systems	O
naturally	O
have	O
greater	O
security	O
risks	O
than	O
traditional	O
business	O
systems	O
,	O
therefore	O
it	O
is	O
important	O
for	O
e-business	B-Application
systems	O
to	O
be	O
fully	O
protected	O
against	O
these	O
risks	O
.	O
</s>
<s>
Customers	O
,	O
suppliers	O
,	O
employees	O
,	O
and	O
numerous	O
other	O
people	O
use	O
any	O
particular	O
e-business	B-Application
system	O
daily	O
and	O
expect	O
their	O
confidential	O
information	O
to	O
stay	O
secure	O
.	O
</s>
<s>
Some	O
of	O
the	O
methods	O
of	O
protecting	O
e-business	B-Application
security	O
and	O
keeping	O
information	O
secure	O
include	O
physical	O
security	O
measures	O
as	O
well	O
as	O
data	O
storage	O
,	O
data	O
transmission	O
,	O
anti-virus	B-Application
software	I-Application
,	O
firewalls	B-Application
,	O
and	O
encryption	O
to	O
list	O
a	O
few	O
.	O
</s>
<s>
Tools	O
such	O
as	O
encryption	O
and	O
firewalls	B-Application
manage	O
this	O
specific	O
concern	O
within	O
e-business	B-Application
.	O
</s>
<s>
E-business	B-Application
transactions	O
pose	O
greater	O
challenges	O
for	O
establishing	O
authenticity	O
due	O
to	O
the	O
ease	O
with	O
which	O
electronic	O
information	O
may	O
be	O
altered	O
and	O
copied	O
.	O
</s>
<s>
Both	O
parties	O
in	O
an	O
e-business	B-Application
transaction	O
want	O
to	O
have	O
the	O
assurance	O
that	O
the	O
other	O
party	O
is	O
who	O
they	O
claim	O
to	O
be	O
,	O
especially	O
when	O
a	O
customer	O
places	O
an	O
order	O
and	O
then	O
submits	O
a	O
payment	O
electronically	O
.	O
</s>
<s>
One	O
common	O
way	O
to	O
ensure	O
this	O
is	O
to	O
limit	O
access	O
to	O
a	O
network	O
or	O
trusted	O
parties	O
by	O
using	O
a	O
virtual	B-Application
private	I-Application
network	I-Application
(	O
VPN	B-Application
)	O
technology	O
.	O
</s>
<s>
digital	O
signatures	O
or	O
voice	B-Application
recognition	I-Application
methods	O
)	O
.	O
</s>
<s>
Many	O
times	O
in	O
e-business	B-Application
,	O
however	O
,	O
"	O
something	O
you	O
are	O
"	O
is	O
pretty	O
strongly	O
verified	O
by	O
checking	O
the	O
purchaser	O
's	O
"	O
something	O
you	O
have	O
"	O
(	O
i.e.	O
</s>
<s>
To	O
help	O
with	O
data	O
integrity	O
,	O
firewalls	B-Application
protect	O
stored	O
data	O
against	O
unauthorized	O
access	O
,	O
while	O
simply	O
backing	O
up	O
data	O
allows	O
recovery	O
should	O
the	O
data	O
or	O
equipment	O
be	O
damaged	O
.	O
</s>
<s>
There	O
are	O
a	O
variety	O
of	O
techniques	O
to	O
address	O
this	O
concern	O
including	O
firewalls	B-Application
,	O
access	O
privileges	O
,	O
user	O
identification	O
and	O
authentication	O
techniques	O
(	O
such	O
as	O
passwords	O
and	O
digital	O
certificates	O
)	O
,	O
Virtual	B-Application
Private	I-Application
Networks	I-Application
(	O
VPN	B-Application
)	O
,	O
and	O
much	O
more	O
.	O
</s>
<s>
Because	O
the	O
availability	O
of	O
service	O
is	O
important	O
for	O
all	O
e-business	B-Application
websites	O
,	O
steps	O
must	O
be	O
taken	O
to	O
prevent	O
disruption	O
of	O
service	O
by	O
events	O
such	O
as	O
power	O
outages	O
and	O
damage	O
to	O
physical	O
infrastructure	O
.	O
</s>
<s>
Examples	O
to	O
address	O
this	O
include	O
data	O
backup	O
,	O
fire-suppression	O
systems	O
,	O
Uninterrupted	O
Power	O
Supply	O
(	O
UPS	O
)	O
systems	O
,	O
virus	B-Application
protection	I-Application
,	O
as	O
well	O
as	O
making	O
sure	O
that	O
there	O
is	O
sufficient	O
capacity	O
to	O
handle	O
the	O
demands	O
posed	O
by	O
heavy	O
network	O
traffic	O
.	O
</s>
<s>
The	O
business	O
internet	O
which	O
supports	O
e-business	B-Application
has	O
a	O
cost	O
to	O
maintain	O
of	O
about	O
$2	O
trillion	O
in	O
outsourced	O
IT	O
dollars	O
just	O
in	O
the	O
United	O
States	O
alone	O
.	O
</s>
<s>
When	O
it	O
comes	O
to	O
security	O
solutions	O
,	O
sustainable	O
electronic	B-Application
business	I-Application
requires	O
support	O
for	O
data	O
integrity	O
,	O
strong	O
authentication	O
,	O
and	O
privacy	O
.	O
</s>
<s>
Numerous	O
things	O
can	O
be	O
done	O
in	O
order	O
to	O
protect	O
our	O
E-Business	B-Application
.	O
</s>
<s>
Furthermore	O
,	O
the	O
other	O
things	O
that	O
require	O
full	O
attention	O
are	O
securing	O
servers	O
and	O
admin	O
panels	O
,	O
payment	O
gateway	O
security	O
,	O
antivirus	B-Application
and	O
anti-malware	B-Application
software	O
,	O
using	O
firewalls	B-Application
is	O
also	O
a	O
must	O
,	O
regular	O
updates	O
,	O
and	O
back	O
up	O
our	O
data	O
.	O
</s>
<s>
One	O
way	O
is	O
to	O
use	O
anti-virus	B-Application
software	I-Application
.	O
</s>
<s>
A	O
second	O
way	O
to	O
protect	O
the	O
data	O
is	O
to	O
use	O
firewalls	B-Application
and	O
network	O
protection	O
.	O
</s>
<s>
A	O
firewall	B-Application
is	O
used	O
to	O
restrict	O
access	O
to	O
private	O
networks	O
,	O
as	O
well	O
as	O
public	O
networks	O
that	O
a	O
company	O
may	O
use	O
.	O
</s>
<s>
The	O
firewall	B-Application
also	O
has	O
the	O
ability	O
to	O
log	O
attempts	O
into	O
the	O
network	O
and	O
provide	O
warnings	O
as	O
it	O
is	O
happening	O
.	O
</s>
<s>
They	O
should	O
look	O
into	O
protected	O
access	O
,	O
virtual	B-Application
private	I-Application
networks	I-Application
,	O
or	O
internet	O
protocol	O
security	O
.	O
</s>
<s>
When	O
looking	O
at	O
e-business	B-Application
we	O
have	O
many	O
advantages	O
,	O
which	O
are	O
mostly	O
connected	O
to	O
making	O
doing	O
business	O
easier	O
.	O
</s>
<s>
The	O
benefits	O
of	O
implementing	O
e-business	B-Application
tools	O
are	O
in	O
the	O
streamlining	O
of	O
business	O
processes	O
and	O
not	O
so	O
much	O
in	O
the	O
use	O
of	O
technology	O
.	O
</s>
<s>
Easy	O
to	O
set	O
up	O
:	O
electronic	B-Application
business	I-Application
is	O
easy	O
to	O
set	O
up	O
even	O
from	O
home	O
,	O
the	O
only	O
requirements	O
are	O
software	O
,	O
a	O
device	O
and	O
an	O
internet	O
connection	O
.	O
</s>
<s>
Cheaper	O
than	O
traditional	O
business	O
:	O
Electronic	B-Application
business	I-Application
is	O
less	O
costly	O
than	O
a	O
traditional	O
business	O
,	O
but	O
it	O
is	O
more	O
expensive	O
to	O
set	O
up	O
.	O
</s>
<s>
Lower	O
levels	O
of	O
inventory	O
:	O
Electronic	B-Application
business	I-Application
enables	O
companies	O
to	O
lower	O
their	O
level	O
of	O
inventory	O
by	O
digitalizing	O
their	O
assets	O
.	O
</s>
<s>
The	O
most	O
common	O
limitations	O
of	O
electronic	B-Application
business	I-Application
are	O
:	O
</s>
<s>
In	O
the	O
traditional	O
model	O
,	O
we	O
have	O
a	O
more	O
personal	O
customer	O
experience	O
,	O
while	O
in	O
the	O
electronic	B-Application
business	I-Application
that	O
is	O
mostly	O
not	O
the	O
case	O
.	O
</s>
<s>
Delivery	O
time	O
:	O
Traditional	O
business	O
enables	O
instant	O
satisfaction	O
as	O
you	O
obtain	O
the	O
product	O
the	O
moment	O
you	O
purchase	O
it	O
,	O
while	O
in	O
electronic	B-Application
business	I-Application
that	O
is	O
not	O
possible	O
.	O
</s>
<s>
For	O
example	O
,	O
Amazon	B-Application
assures	O
one-day	O
delivery	O
.	O
</s>
<s>
Security	O
issues	O
:	O
Scams	O
could	O
be	O
mentioned	O
as	O
a	O
factor	O
for	O
people	O
's	O
distrust	O
in	O
electronic	B-Application
business	I-Application
.	O
</s>
