Section 12.1 Section 12.2 Discuss the functions of a Web site

Slides:



Advertisements
Similar presentations
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Advertisements

17 HTML, Scripting, and Interactivity Section 17.1 Add an audio file using HTML Create a form using HTML Add text boxes using HTML Add radio buttons and.
RP Designs Semi-Custom e-Commerce Package. Overview RP Designs semi- custom e-commerce package is a complete website solution. Visitors can browse a catalog.
WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Microsoft Passport Waldemar Swiercz.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Chapter 8 DESIGNING WEBSITES - From Page to Stage Day 13.
The Internet 8th Edition Tutorial 1 Browser Basics.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Section 13.1 Add a hit counter to a Web page Identify the limitations of hit counters Describe the information gathered by tracking systems Create a guest.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Session 11: Security with ASP.NET
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Chapter 10 Developing a Web-Based Online Shopping Application (I)
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
10 Adding Interactivity to a Web Site Section 10.1 Define scripting Summarize interactivity design guidelines Identify scripting languages Compare common.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
Section 17.1 Add an audio file using HTML Create a form using HTML Add text boxes using HTML Add radio buttons and check boxes using HTML Add a pull-down.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Section 10.1 Define scripting
Section 6.1 Section 6.2 Write Web text Use a mission statement
Setting and Upload Products
Section 11.1 Identify the stages of the Web site development life cycle Identify the responsibilities of project team members Use a checklist to evaluate.
Section A: Web Technology
To the ETS – Accounts Setup and Preferences Online Training Course
Section 7.1 Section 7.2 Identify presentation design principles
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 8 Building the Transaction Database
Chapter 17 Risks, Security and Disaster Recovery
Section 17.1 Section 17.2 Add an audio file using HTML
USING CARLI DIGITAL COLLECTIONS
Section 15.1 Section 15.2 Identify Webmastering tasks
BY GAWARE S.R. DEPT.OF COMP.SCI
Section 10.1 YOU WILL LEARN TO… Define scripting
E-Commerce Security.
Buying and selling over the Internet
12 E-Commerce Overview.
How to Register on Active Orders Trading Grid Company Registration
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Internet.
To the ETS – Accounts Setup and Preferences Online Training Course
Chinese wall model in the internet Environment
Unit 8 Network Security.
Designing IIS Security (IIS – Internet Information Service)
Electronic Payment Security Technologies
Human and Computer Interaction (H.C.I.) &Communication Skills
Business Zone - Clearing your Cache
Presentation transcript:

Section 12.1 Section 12.2 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use of privacy policies Compare and contrast Web site privacy and security Discuss security measures used by e-commerce sites

Examining an E-commerce Web Site pp. 320-327 Examining an E-commerce Web Site 12.1 Guide to Reading Main Ideas Many e-commerce sites exist to provide information about a company and its products. Feedback forms allow visitors to share their thoughts about the business, the products, and the site. Key Terms feedback form scroll box option button check box

Examining an E-commerce Web Site pp. 320-327 Examining an E-commerce Web Site 12.1 Examining the WebTee.biz Site Many businesses use Web sites to present information about their products and services. The WebTee.biz Web site is a B2C e-commerce site. The site performs several functions: It gives the company a presence on the Web. It showcases the company’s products and services. It gives visitors a chance to contact and interact with the company in various ways.

Examining an E-commerce Web Site pp. 320-327 Examining an E-commerce Web Site 12.1 Examining the WebTee.biz Site The WebTee.biz Web site consists of five main pages, with a child on one of the pages. Home Products FAQ Press Release Contact Us Order Form

Examining an E-commerce Web Site pp. 320-327 Examining an E-commerce Web Site 12.1 Enhancing the WebTee.biz Site You can enhance a simple site like the WebTee.biz site with certain useful features: Feedback form Scroll box Option button Check box option button A type of form field that allows visitors to choose only one option from a list of available options; also known as a radio button. (p. 324) check box A form field option that allows visitors to choose as many items from a list as they desire. (p. 326)

Examining an E-commerce Web Site pp. 320-327 Examining an E-commerce Web Site 12.1 Enhancing the WebTee.biz Site Check boxes allow visitors to select as many choices as they desire.

Examining an E-commerce Web Site pp. 320-327 Examining an E-commerce Web Site 12.1 Activity 12A – Exploring the WebTee.biz Web Site (p. 321) Activity 12B – Adding a Feedback Form (p. 323) Activity 12C – Adding Option Buttons (p. 324) Activity 12D – Adding Check Boxes (p. 326)

Web Site Privacy and Security pp. 329-333 Web Site Privacy and Security 12.2 Guide to Reading Main Ideas E-commerce sites work to maintain the privacy of their customers. They must also try to ensure that business conducted over the Internet is secure. Key Terms privacy cookie privacy policy security data encryption SSL (Secure Socket Layer) digital certificate

Web Site Privacy and Security pp. 329-333 Web Site Privacy and Security 12.2 Web Site Privacy While customers have an expectation of privacy on the Web, many e-commerce sites use cookies to gather information. Many Web sites post privacy policies to explain to users how they can control the amount of information they give to the sites. privacy The ethical online collection and use of visitors’ personal information. (p. 329) cookie A small data file that a Web site writes to a visitor’s hard drive containing personal information such as login or registration information. (p. 329) privacy policy A written statement that outlines what information the Web site collects about visitors and explains how that information will be used. (p. 330)

Web Site Privacy and Security pp. 329-333 Web Site Privacy and Security 12.2 Web Site Security E-commerce companies must be very concerned with security issues. Some effective ways to protect information on the Web are: Data encryption Digital certificates security The protection of data from unauthorized access, both on the Web server and during transmission over the Web. (p. 331) data encryption Security measure in which sensitive information is encoded and decoded as it is transferred across the Internet. (p. 332) digital certificate A document issued by an independent certification authority that confirms a business’s credentials. (p. 332)

Web Site Privacy and Security pp. 329-333 Web Site Privacy and Security 12.2 Web Site Security The most commonly used data encryption method among Web site publishers is SSL (Secure Socket Layer). SSL uses an encryption algorithm specifically designed to protect data transmitted across the Internet. Secure Socket Layer (SSL) An authentication and encryption method developed by Netscape Communications used to protect communications between client and server. (p. 332)

Web Site Privacy and Security pp. 329-333 Web Site Privacy and Security 12.2 Web Site Security Double-clicking on the SSL padlock allows you to view a site’s digital certificate.

Web Site Privacy and Security pp. 329-333 Web Site Privacy and Security 12.2 Activity 12E – Adding a Privacy Policy (p. 330)

Chapter 12 Resources For more resources on this chapter, go to the Introduction to Web Design Web site at webdesign.glencoe.com.