Principles of E-business. Two factors that significant contribute to the success of e-business are: the trust people place in the online businesseshow.

Slides:



Advertisements
Similar presentations
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Advertisements

E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Electronic Transaction Security (E-Commerce)
E-Commerce Technologies for Web Applications. Overview Introduction in E-Commerce - Numbers and Projections Engineering – Layers of E-Commerce - Credit.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
E-Commerce Security Brett Hinshaw Kevin Hooker Jeff Hunter Shane Worrell.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 1. Electronic Commerce  Brief History of Commerce and Communication  Introduction to Electronic Commerce  Laws Guiding E-commerce  Are we.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Internet Security for Small & Medium Business Week 6
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Payment Systems. Payment Revolution 1970: Electronic Funds Transfer between banking industries 1980: Electronic Data Interchange (EDI) for e- commerce.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Week 3 E-GOVERNMENT. Security PRIVACY Learning outcome At the end of this slide, student can: 1) Explain the network security 2) Understand the contribution.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Lesson 15 : Networks And The Internet
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
Securing Information Systems
Securing Information Systems
Chapter 5 Electronic Commerce | Security Threats - Solution
Lecture 11- Business Information Systems: E-Commerce
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
E-Commerce Basics You know your excited.
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security Threats - Solution
Chapter 11 crime and security in the networked economy
BY GAWARE S.R. DEPT.OF COMP.SCI
Securing Information Systems
Connor Griesemer and Kevin Wu
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
E-commerce Chapter 9 pp
Web Service Accounting System
Module 4 System and Application Security
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

Principles of E-business

Two factors that significant contribute to the success of e-business are: the trust people place in the online businesseshow secure they feel in transacting business on the Internet.

TRUST  Trust is something that has to be earned over a period of time  Trust brings in repeat business, an essential ingredient for success.  The topic of online trust has been studied in the literature from a variety of angles such as: transaction information content institutiontechnologyproduct

Factors contributing to trust  Trust is not easy to measure. It is developed over time. People trust a business based on their own past experience as well as by third party recommendations.  In the world of online commerce the factors that significant contribute for enhancing transaction trust are:  These qualities support our working definition for trust. Thus, customers want to feel good about each and every one of these aspects before they form the opinion that the business is trustworthy. easy access to description of products and services ease of placing orders Order confirmationorder trackingpost-sales service

SECURITY  Security is something that the businesses can strive to provide.  There are several tools available to enhance security on the Internet. Secure Socket Layer (SSL) Netscape developed SSL to support point-to-point encryption. SSL is widely recognized as contributing to online security and thus is an important contributor for trust building. Secure Electronic Transaction (SET) Visa and MasterCard developed SET jointly, along with several other technology companies, as an open standard to support end-to-end secure online transactions.

 The backbone of SET is encryption.  SET uses industrial strength encryption to reduce fraud and minimize risk to the parties involved.  SET’s three principal goals emulate the traditional card-processing environment for use on the Internet.  These are: authentication non-repudiation integrity

Introduction of Cyber Law Acts in Malaysia  Despite being a positive tool for users, there are some of irresponsible people that are using internet in negative way such as online fraud, identity theft, virus attack and hacking.  Therefore, Malaysian government has already taking a big step to overcome these problems by introducing a few acts of law that can be used for cyber crimes.

ACT These are a list of statutes in Malaysia regarding the Cyber law. Communications and Multimedia Act 1998 Computer Crimes Act 1997 Electronic Commerce Act 2006 Copyright Act (Amendment)1997 Electronic Government Activities Act 2007 Payment Systems Act 2003 Personal Data Protection Act 2010 Telemedicine Act 1997 Penal Code (including Chapter on terrorism & cyber-terrorism) Communications and Multimedia Content Code