-
Essay / Online Clothing Shopping Study - 3669
IntroductionThe existence of many sophisticated computer systems and various innovations in the computer age justifies the need for new ways of selling in society. The need for information sharing in what is called a "global network" and man's desire to communicate at a distance called for the birth of the World Wide Web (formerly known as ARPANET). With the advent of the Internet, many mundane tasks and endeavors have become feasible. Things like buying and selling can now be done online. Consumers no longer need to leave their homes. A few clicks from home would be enough to get the job done. Not only does the Internet make shopping easier, it also allows for distance learning. Students can earn a degree by completing online education via the Internet. The high adoption of the Internet opens up a variety of opportunities for businesses. People are more online than ever. They spend many hours every day on social networks such as Facebook and Google+. It's no wonder that buying and selling can now be done more conveniently. Although traditional shopping is still thriving, online shopping can be an alternative for people looking to save time and money. If a certain customer is planning to go shopping, it can be stressful and time-consuming. E-commerce has made shopping or any type of transaction online much easier and convenient. It introduces new facilities, opportunities and purchasing methods for sellers and customers. Therefore, e-commerce, and especially online shopping, is crucial for retail stores. They must provide the infrastructure needed to sell their products online. By leveraging e-commerce, they can not only gain a competitive advantage in online shopping, but also...... middle of paper ...... differentiating between GP, NAV, SL and AX”. Accessed 14 May 2014. Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, “Authentification and Authorization:Tool for Ecommerce Security”, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.Schneider, GP 2011, Electronic commerce, ninth edition, Joe Sabatino, Boston.Symantec 2013, Secure Sockets Layer (SSL): How It Works, Symantec, accessed May 15, 2013, .The Iconic 2013, Return, The Iconic, accessed May 15, 2013, .Yahia Zare Mehrjerdi, (2010) "Enterprise Resource Planning: Risk and Benefit Analysis", Business Strategy Series, Vol. 11 Iss: 5, p..308 – 324.