Web Development & Design Foundations with H T M L 5

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
CP3397 ECommerce.
Cryptography and Network Security
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Principles of Information Security, 2nd edition1 Cryptography.
Electronic Transaction Security (E-Commerce)
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-Business and E-Commerce
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
Copyright © 2002 Pearson Education, Inc. Slide 6-1.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Chapter 11 E-Commerce.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
1 Web Developer Foundations: Using XHTML Chapter 12 E-Commerce Overview Modified by Linda Kenney November, 2006.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
1 E-Commerce Overview Prepared by Terry Morris Kappa Beta Delta Harper College 11/03/04.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
1 Chapter 11 Understanding Computers, 11 th Edition 11 E-Commerce TODAY AND TOMORROW 11 th Edition CHAPTER.
Types of Electronic Infection
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Systems that support electronically executed business transactions.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
1 Internet data security (HTTPS and SSL) Ruiwu Chen.
Chapter 5 – E-commerce and Enterprise Systems
INTRODUCTION E-COMMERCE.
Section A: Web Technology
إدارة الأعمال الإلكترونية عمادة التعلم الإلكتروني والتعليم عن بعد
SSL Certificates for Secure Websites
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 8 Building the Transaction Database
Web Development & Design Foundations with HTML5 8th Edition
Copyright (c) 2007Prentice-Hall. All rights reserved.
School of Business Administration Web Multimedia & Interactivity
E-Commerce Security.
Using SSL – Secure Socket Layer
12 E-Commerce Overview.
Cryptography and Network Security
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Web Development & Design Foundations with HTML5
Web Development & Design Foundations with H T M L 5
Web Development & Design Foundations with H T M L 5
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Electronic Payment Security Technologies
Cryptography and Network Security
Presentation transcript:

Web Development & Design Foundations with H T M L 5 Ninth Edition Chapter 12 E-Commerce Overview If this PowerPoint presentation contains mathematical equations, you may need to check that your computer has the following installed: 1) MathType Plugin 2) Math Player (free versions available) 3) NVDA Reader (free versions available) Slides in this presentation contain hyperlinks. JAWS users should be able to get a list of links by using INSERT+F7 Copyright © 2019, 2017, 2015 Pearson Education, Inc. All Rights Reserved

Learning Objectives 12.1 define e-commerce 12.2 identify benefits and risks of e-commerce 12.3 describe e-commerce business models 12.4 describe e-commerce security and encryption 12.5 define Electronic Data Interchange (E D I) 12.6 describe trends and projections for e-commerce 12.7 describe issues related to e-commerce 12.8 describe options for order and payment processing

What is E-Commerce? The integration of communications, data management, and security technologies to allow individuals and organizations to exchange information related to the sale of goods and services. Major functions of E–Commerce include: the buying of goods, the selling of goods, and performance of financial transactions on the Internet.

E-Commerce Advantages for Businesses Reduced Costs Increased Customer Satisfaction More Effective Data Management Potentially Higher Sales

E-Commerce Advantages for Consumers Convenience Easier Comparison Shopping Wider Selection of Goods

E-Commerce Risks for Businesses Need for a robust, reliable web site Fraudulent transactions Customer reluctance to purchase online Increased competition

E-Commerce Risks for Consumers Possible Security Issues Possible Privacy Issues Purchasing from photos & descriptions Possible difficulty with returns

E-Commerce Business Models B2C – Business-to-Consumer B2B – Business-to-Business C2C – Consumer-to-Consumer B2G – Business-to-Government

Electronic Data Interchange (E D I) The transfer of data between different companies using networks. Facilitates the exchange of standard business documents including purchase orders and invoices E D I is not new -- In existence since the 1960s Trading Partners Organizations that exchange E D I transmissions Newer technologies X M L and Web Services are replacing traditional E D I Provide opportunities to customize secure information exchange over the Internet

E-Commerce U.S. Retail Sales What do people buy online? Clothing, accessories, and footwear ($58.2 billion) Furniture and home furnishings ($32.4 billion) Electronics and appliances ($30 billion) Sporting goods ($13.1 billion) Books and magazines ($12.6 billion) Toys, hobby goods, and games ($12.1 billion) Office equipment and supplies ($10.6 billion) Food, beer, and wine ($9.8 billion) 2015 Sales Figures http://www2.census.gov/retail/releases/current/arts/ecommerce4541.xls

Who’s on the Internet? (1 of 2) Table 12.1 Online population Category Percentage That Use the Internet Men 89% Women 86% Age: 18-29 99% Age: 30-49 96% Age: 50-64 87% Age: Over 65 57% Household Income: Less than $30,000 79% Household Income: $30,000 to $49,999 90% Household Income: $50,000 to $74,999 95% Household Income: $75,000 or higher 98% Education: High school graduate 81% Education: Some college 94.1% Education: College graduate

Who’s on the Internet? (2 of 2) Source: http://www.pewinternet.org/data-trend/internet- use/latest-stats/ Other Demographics: http://www.pewinternet.org/ http://www.clickz.com http://www.census.gov/eos/www/ebusiness614.htm

E-Commerce Issues Intellectual Property Security Fraud Taxation International Commerce

E-Commerce Security Encryption Ensures privacy within an organization and on the Internet. The conversion of data into an unreadable form, called a ciphertext. Decryption The process of converting the ciphertext back into its original form, called plaintext or cleartext, so it can be understood. The encryption/decryption process requires an algorithm and a key.

E-Commerce Security Encryption Types Secure E-Commerce transactions use the encryption technologies below: Symmetric-key Encryption Asymmetric-key Encryption Hash Encryption S S L (Secure Sockets Layer) Utilizes these encryption technologies Provides for secure transmission of data on the Internet.

E-Commerce Security: Symmetric-Key Symmetric-Key Encryption Also called single-key encryption Both encryption and decryption use the same key Both the sender and receiver must know the key before communicating using encryption. Advantage: speed

E-Commerce Security: Asymmetric-Key Asymmetric-Key Encryption Also called public-key encryption There is no shared secret Two keys are created at the same time: Public key Private key Asymmetric-key encryption is much slower than symmetric- key encryption.

E-Commerce Security: Hash Hash Encryption A hash algorithm transforms a string of characters into a “digest” A shorter fixed-length value or key that represents the original string One-way encryption Used for information that will not be read or decrypted Purpose: verify the integrity of information

Secure Sockets Layer (S S L) (1 of 2) A protocol that allows data to be privately exchanged over public networks Developed by Netscape Encrypts data sent between a client (usually a Web browser) and a Web server. Utilizes both symmetric and asymmetric keys. “https” protocol Browsers display a “lock” icon

Secure Sockets Layer (S S L) (2 of 2) S S L provides secure communication between a client and server by using: Server and (optionally) client digital certificates for authentication Symmetric-key cryptography using a "session key" for bulk encryption Public-key cryptography for transfer of the session key Message Digests (hash encryption) to verify the integrity of the transmission

S S L & Digital Certificate A form of an asymmetric key Also contains information about the certificate, the holder of the certificate, and the issuer of the certificate. Used by S S L to authenticate the identity of the web server

Digital Certificate The contents of a digital certificate include: The public key Effective date of the certificate Expiration date of the certificate Details about the Certificate Authority -- the issuer of the certificate Details about the certificate holder A digest of the certificate content

Certificate Authority A trusted third-party organization or company that issued digital certificates. Well-known Certificate Authorities: Verisign http://www.verisign.com Thawte http://www.thawte.com

Checkpoint 12.1 Describe three advantages of e-commerce for an entrepreneur just starting a business. Describe three risks that businesses face when engaging in e-commerce. Define S S L. Describe how an online shopper can tell that an e-commerce site is using S S L.

Order & Payment Processing E-Commerce Payment Methods: Credit Card Stored-value Card Smart Card Digital Cash

E-Commerce Storefront Solutions Instant Online Storefront Shopify, BigCommerce Off-The-Shelf Shopping Cart Software Agoracart, osCommerce, ZenCart Custom Built Solution I B M's WebSphere Commerce Suite, Microsoft's Commerce Server Microsoft Visual Studio, Adobe Dreamweaver Semi-Custom Built Solutions on a Budget Paypal order processing Free shopping cart scripts

Checkpoint 12.2 List three payment methods commonly used on the Web. Have you purchased online? If so, think of the last item that you purchased. a. Why did you purchase it online instead of at a store? b. Did you check to see if the transaction was secure? Why or why not? c. How will your shopping habits be different in the future? Describe three types of e-commerce solutions available. Which provides the easiest entry to e-commerce? Explain.

Summary This chapter introduced you to basic e-commerce concepts and implementations. Consider taking an E-Commerce course in the future to continue your study of this dynamic and growing area of web development.

Copyright