Noah Zikmund Leeds School of Business University of Colorado/Boulder

Slides:



Advertisements
Similar presentations
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Advertisements

Internet, Intranet and Extranets
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-business Infrastructure
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Internet Security for Small & Medium Business Week 6
Exploring Business 2.0 © 2012 Flat World Knowledge Chapter 15: Managing Information And Technology.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
In general, the cloud is the concept of remotely hosted IT services (cloud apps) provided by a supplier (cloud providers)
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
ACM 511 Introduction to Computer Networks. Computer Networks.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Identity Theft How it happens and how to avoid it.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Technical Implementation: Security Risks
Getting Online, Working Online
Overview of E-Commerce
Lecture 6: Cloud Computing
Chapter 9 e-Commerce Systems.
Chapter 1: Exploring the Network
Internet, Intranet and Extranets
Discovering Computers 2010: Living in a Digital World Chapter 14
Amity School of Business BBA, Semester - II E - Commerce Arpan Sinha
Chapter 17 Using Technology in a Competitive Environment.
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Using Apps to Get and Share Information
Internet, Intranet and Extranets
Understanding the Project Data
DIRECTOR OF CLOUD SERVICES
Chapter 5 Electronic Commerce | Security
Introduction to Computers
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Unit 9 Network Fundamentals
Chief Information Officer
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Internet, Intranet and Extranets
Scams, Identity Theft, and Viruses Kelly & Caitlin
Connor Griesemer and Kevin Wu
Introduction to Business & Marketing
BCOR 2500 “Da Web” Ken Kozar/Tom Miaskiewicz Leeds School of Business
Chapter 5 Electronic Commerce | Security
Quiz 3.
Quiz 3.
Operations Management Part III
Communicating Through the Internet and Other Technologies
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Module 6 Information Sharing and Communication
Cyber security and Computer Misuse
Intranets & Extranets Companies that do not have the resources to invest in enterprise applications can still achieve some measure of information integration.
Security in mobile technologies
Getting Online, Working Online
Modern benefits administration and HR software, supported by us.
Getting Online, Working Online
Presentation transcript:

Noah Zikmund Leeds School of Business University of Colorado/Boulder BCOR 2500 “The Web” Noah Zikmund Leeds School of Business University of Colorado/Boulder

Recitations Friday in KOBL 320 or S125 Your recitation leader will be there to help you with your project work! If you don’t attend the recitation, don’t expect them to help you outside of the recitation. Section 101: 9:00 – 9:50 AM in KOBL S125 – Noah Section 102: 10:00 – 10:50 AM in KOBL S125 – Whitney Section 103: 11:00 – 11:50 AM in KOBL S125 – Whitney Section 104: 12:00 – 12:50 PM in KOBL 320 – Jason Section 105: 12:00 – 12:50 PM in KOBL S125 – Addison Section 106: 1:00 – 1:50 PM in KOBL 320 – Vimi Section 107: 1:00 – 1:50 PM in KOBL S125 – Chris Section 108: 2:00 – 2:50 PM in KOBL 320 – Nhan Section 109: 2:00 – 2:50 PM in KOBL S125 – Chris Section 110: 3:00 – 3:50 PM in KOBL 320 – Addy

Objective Have you all become Web Savvy Discuss the web Explain how it works Why it is useful Dangers Talk about the future

What is The Internet? Internet is network on which the “web” is built A series of tubes Scalable and distributed

How does the web work? Distributed Scalable No central traffic control Multiple paths Links can be removed

Usefulness of Web? Communicating Researching Sharing Selling Integrating with Online Communities … The web is always evolving

Social Networking Fun Your Web presence Job searching Business Web Presence Is it Free?

How Businesses use the Web Communication Webinars Banking Convincing Business Communities Hire employees ……

Intranets Within the boundaries of an organization You have used? Registration? Leeds School? Meeting minutes, announcements, bylaws, lists, calendar, etc.) Companies? Benefits enrollment, performance reporting, etc.

Extranets Suppliers with purchasing and supply chain Customers with customer relationship management (Amazon)

Dangers of the Web Incorrect information Inconsistent information In state of flux Many authors, few editors Security and privacy

Identity Theft Definition Prevention How does it affect businesses? Free Credit check www.AnnualCreditReport.com

Business Dangers of the Web Corporate espionage Government espionage Customer Privacy …..

Security measures Unless some restrictions are introduced, internet communication is accessible to all! 45.7 million credit card numbers stolen at TJX Security measures Encryption TOM -> RAD (T=R, O=A, M=D) Firewall Fence around an organization Intrusion Protection system Traffic monitoring Avoiding flooding (denial of service)

Passwords P@ssw0rd jill01 Jjch55!!232 admin838

Biometrics Fingerprint verification Hand geometry Retinal scanning Iris scanning Signature verification

How has the web changed the way business gets done?

Future of the Web Mobile web Cloud computing Television Apps Cloud computing Television Video phones/ Skype

Cloud Computing

Cloud Computing Using someone else's server Remote exchange servers Remote Backup Dumb terminals Mobile me

Internet TV Hulu TiVo Netflix Comcast Boxee

Google Search Google Mail Google Maps Google Phone Nexus one Google Apps Sync

Eurasia e-Commerce Module 1 Module 2 Understanding and Planning e-Commerce Module 2 Implementing an e-Commerce website

Next Class What is ecommerce How to set up an ecommerce business SEO More on the future of the web and mobile computing

Homework Review ecommerce documents stored in additional readings, ecommerce folder on CULearn Think of what it would be like to start an ecommerce based business