 2004 Prentice Hall, Inc. All rights reserved. 1 Chapter 38 - e-Business & e-Commerce Outline 38.1 Introduction 38.2 e-Business Models 38.2.1 Storefront.

Slides:



Advertisements
Similar presentations
E-Business and e-Commerce. e-commerce and e-business e-commerce refers to aspects of online business involving exchanges among customers, business partners.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Back to Table of Contents
Week 6 Lecture Part 2 Databases in Electronic Commerce Samuel Conn, Asst. Professor.
Chapters 14 & 15 Internet Databases. E-Commerce  Bringing new products, services, or ideas to market, supporting and enhancing business operations 
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Electronic Commerce Systems
Chapter 9 e-Commerce Systems.
Introduction to Electronic Commerce
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
E-Business University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Electronic Payment Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
E-Commerce Systems Chapter 8
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Internet Security for Small & Medium Business Week 6
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
Types of Electronic Infection
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B11 Ebusiness.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Internet Architecture and Governance
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 32 - e-Business & e-Commerce Outline 32.1 Introduction 32.2 E-Business Models Storefront.
Topic 5: Basic Security.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
EXAM PREP WORKSHOP MANAGEMENT INFORMATION SYSTEMS.
Chapter 1 Introduction to Electronic Commerce. Learning Objectives In this chapter, you will learn about: The basic elements of electronic commerce Differences.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
E-Commerce Systems Chapter 9 McGraw-Hill/IrwinCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Electronic Banking & Security Electronic Banking & Security.
Free But Effective Listing Building and Marketing Service How to easily and quickly grow a list of potential buyers and constantly send them marketing.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Chapter 9 e-Commerce Systems McGraw-Hill/Irwin
Presentation transcript:

 2004 Prentice Hall, Inc. All rights reserved. 1 Chapter 38 - e-Business & e-Commerce Outline 38.1 Introduction 38.2 e-Business Models Storefront Model Shopping-Cart Technology Auction Model Portal Model Name-Your-Price Model Comparison-Pricing Model Bartering Model 38.3 Building an e-Business 38.4 e-Marketing Branding Marketing Research Marketing

 2004 Prentice Hall, Inc. All rights reserved. 2 Chapter 38 - e-Business & e-Commerce Promotions Consumer Tracking Electronic Advertising Search Engines Affiliate Programs Public Relations Customer Relationship Management (CRM) 38.5 Online Payments Credit-Card Payment Digital Cash and e-Wallets Micropayments Smart Cards

 2004 Prentice Hall, Inc. All rights reserved. 3 Chapter 38 - e-Business & e-Commerce 38.6 Security Public-Key Cryptography Cryptanalysis Key Agreement Protocols Key Management Secure Sockets Layer (SSL) WTLS IPSec and Virtual Private Networks (VPN) Security Attacks Network Security 38.7 Legal Issues Privacy Defamation Sexually Explicit Speech SPAM Copyright and Patents

 2004 Prentice Hall, Inc. All rights reserved. 4 Chapter 38 - e-Business & e-Commerce 38.8 XML and e-Commerce 38.9 Introduction to Wireless Technology and m-Business m-Business Identifying User Location E911 Act Location-Identification Technologies Wireless Marketing, Advertising and Promotions Wireless Payment Options Privacy and the Wireless Internet Web Resources

 2004 Prentice Hall, Inc. All rights reserved. 5 Objectives In this tutorial, you will learn: –To understand how the Internet and World Wide Web are revolutionizing business processes. –To introduce various business models used on the Web. –To explore the advantages and disadvantages of creating an online business. –To examine marketing, payment, security and legal issues that affect e-businesses.

 2004 Prentice Hall, Inc. All rights reserved Introduction Successful online businesses –Recognize need or demand –Meet that need –Must constantly readjust to shifting trends and technologies –Personalization Tradeoff between convenience and privacy concerns E-commerce vs. e-business –E-commerce Aspects of doing business online that relate to exchanges with customers, partners and vendors. –E-business All aspects of e-commerce, plus internal operations of doing business

 2004 Prentice Hall, Inc. All rights reserved e-Business Models e-business –Expansion of old technologies and techniques Electronic Funds Transfers, for example –Requires new business models and categories –Pioneered by early e-businesses Amazon.com, eBay, Yahoo among others

 2004 Prentice Hall, Inc. All rights reserved Storefront Model Simulates the experience of shopping in a store –Very common –Provides services similar to real “brick and mortar” store Transaction processing Security Payment Information storage –Products organized into catalogs that users can browse and search

 2004 Prentice Hall, Inc. All rights reserved Shopping-Cart Technology Shopping-cart metaphor –Holds items a user has selected to buy –Merchant server contains database of available items –User puts all desired items in the cart –When finished, user “checks out” Prices totaled Shipping, tax and other charges applied Shipping and payment details gathered Order confirmed

 2004 Prentice Hall, Inc. All rights reserved Auction Model Online auctions –Buyers bid on items made available by various sellers No fixed price –Very attractive to customers Often able to get lower prices on goods than traditional stores –Site is searchable to allow easy location of desired items –Site receives a commission on each sale –Model also employed in business-to-business transactions – is the leading auction site

 2004 Prentice Hall, Inc. All rights reserved Auction Model Fig. 38.1eBay home page. (These materials have been reproduced with the permission of eBay Inc. COPYRIGHT © EBAY INC. ALL RIGHTS RESERVED.)

 2004 Prentice Hall, Inc. All rights reserved Auction Model Fig. 38.2Placing a bid on eBay. (These materials have been reproduced with the permission of eBay Inc. COPYRIGHT © EBAY INC. ALL RIGHTS RESERVED.)

 2004 Prentice Hall, Inc. All rights reserved Portal Model Portal sites –Combine many services into one page News Sports Weather Web searches –Horizontal portals Search engines Aggregate information on broad range of topics –Vertical portals Information on narrow range of topics –Convenient, centralized access to information

 2004 Prentice Hall, Inc. All rights reserved Name-Your-Price Model User submits price they are willing to pay –Site then passes it along to partner sites, who evaluate the offer –If accepted, user must pay that price –If rejected, user may submit a new price –Many such sites employ intelligent agents Search, arrange, analyze large amounts of data

 2004 Prentice Hall, Inc. All rights reserved Comparison-Pricing Model Poll merchants for lowest price on an item –Often generate revenue through partnerships with other sites –Convenient way to search multiple merchants –Not always the true best price Non-partner merchants might have better offers, but be unlisted –Can employ search-engine technology to automatically seek out best prices or related products

 2004 Prentice Hall, Inc. All rights reserved Bartering Model Trade items rather than currency –Similar to auction sites –Merchant and customer haggle to a fair price –In practice, transaction is usually a combination of currency and items

 2004 Prentice Hall, Inc. All rights reserved Building an e-Business Multiple approaches –Turnkey solutions Ready-made e-Business sites –e-Business templates Outline business’ structure Design details left open to owner –Outsource control entirely to a specialized firm Expensive Little hassle, lets experts control it while you control your business –Build original, custom solution Allows maximum control, makes your site unique Most expensive, involves “reinventing the wheel”

 2004 Prentice Hall, Inc. All rights reserved e-Marketing Marketing campaign –Marketing your site through multiple means –Market research –Advertising –Promotions –Branding –Public Relations (PR) –Search engines

 2004 Prentice Hall, Inc. All rights reserved Branding Brand –Name, logo or symbol that defines company’s products or services Unique Recognizable Easy to remember –Brand equity “Value” of the brand Customer perception and loyalty –Companies with existing brand may more easily establish their brand on the Internet New companies must work to establish trust in their brand

 2004 Prentice Hall, Inc. All rights reserved Marketing Research Marketing research –Marketing mix Product or service details Pricing Promotion Distribution –Focus groups –Interviews –Surveys and questionnaires –Secondary research Reviewing pre-existing data

 2004 Prentice Hall, Inc. All rights reserved Marketing Research Marketing research, cont. –Demographics Statistics on human population –Psychographics Lifestyles, backgrounds, values –Online focus groups Easier to conduct than in-person testing Get feedback from real customers

 2004 Prentice Hall, Inc. All rights reserved Marketing marketing –Part of the reach of the campaign Span of people who marketing should target –Direct mail vs. indirect mail Direct mail is personalized to the individual recipient Direct is often more effective Offers right product at right time Tailor mailing to customer’s interests –Opt-in lists Customer chooses to subscribe Send newsletters with information on offers and promotions

 2004 Prentice Hall, Inc. All rights reserved Marketing marketing, cont. –Dangers of marketing Do not flood customers with too much in too short a time Do not send unsolicited –Spam –Gives company a poor reputation, illegal in some areas

 2004 Prentice Hall, Inc. All rights reserved Promotions Promotions –Attract visitors –Encourage purchasing –Increase brand loyalty –Should not be only reason people purchase from your company Sign of weak product or brand –Be sure cost of promotion is not so great that no profit is ever seen

 2004 Prentice Hall, Inc. All rights reserved Consumer Tracking Consumer tracking –Keep user profiles –Record visits –Analyze results of advertising and promotion –Helps define target market Group toward whom it is most profitable to target marketing resources –Log files contain many useful details IP address Time and frequency of visits

 2004 Prentice Hall, Inc. All rights reserved Consumer Tracking Consumer tracking, cont. –Cookies Text file stored on customer’s computer Can contain record of user’s actions, preferences, buying habits

 2004 Prentice Hall, Inc. All rights reserved Electronic Advertising Advertising –Establish and strengthen branding –Publish URL in all advertising Internet advertising becoming important –Links and banners on sites viewed often by target market Can be interactive or animated –Allow advertising on your site in return for payment –Pop-up ads Appear in a separate window when page loads Often extremely irritating to customers Actually decrease interest in advertised product due to negative association with pop-up ad

 2004 Prentice Hall, Inc. All rights reserved Electronic Advertising Search engine advertising –Pay for better placement of your site in search results –Sites that receive more clicks on their advertisements move higher in rankings

 2004 Prentice Hall, Inc. All rights reserved Search Engines Search engines –Scan websites for desired content –Being highly ranked in search results important People tend not to browse results too deeply –Some sites base your ranking on meta tags Hidden XHTML tags that contain information about site Keywords, title, summary –Others simply “spider” the site Program reads content and decides what is important

 2004 Prentice Hall, Inc. All rights reserved Search Engines Search engines, cont. –Google a leading search engine Uses complex formulas to rank pages Number of sites linked to you, and their ranking Number of clicks on your site Relevance to keyword user is searching for

 2004 Prentice Hall, Inc. All rights reserved Affiliate Programs Affiliate programs – Company pays other sites to be affiliates Advertise the company’s products When their ad leads to purchases from the company, affiliate site receives a commission –Increases exposure and number of site visits –Amazon.com has large, successful affiliate program

 2004 Prentice Hall, Inc. All rights reserved Public Relations Public relations –Provide customers with latest information Products and services Sales Promotions –Press releases –Presentations and speeches – –Crisis management Issue statements regarding company problems Minimize damage to company, brand and reputation

 2004 Prentice Hall, Inc. All rights reserved Customer Relationship Management Customer Relationship Management (CRM) –Provision and maintenance of quality service –Communicate with customers –Deliver responses to customers’ wants and needs –Customer satisfaction key to successful business Much easier, less expensive to retain customers than attract new customers –Challenging for online businesses Transactions not conducted in person Requires innovative new techniques –eCRM, iCRM Refer to CRM conduced via Internet, interchangeable terms

 2004 Prentice Hall, Inc. All rights reserved Customer Relationship Management Aspects of CRM –Call handling Management of calls between customers and service representatives –Sales tracking –Transaction support Support for people and technology involved in keeping transactions running smoothly –Personalization of customer experience

 2004 Prentice Hall, Inc. All rights reserved Online Payments Electronic Funds Transfer –Basis for online payments –Multiple ways of conducting EFT’s and presenting them to the customer –Many companies offer EFT solutions

 2004 Prentice Hall, Inc. All rights reserved Credit-Card Payment Online credit-card payment –Popular and common Many people have and are familiar with credit cards –Some customers have security and privacy concerns –Require merchant account at bank Special card-not-present (CNP) account for online transactions

 2004 Prentice Hall, Inc. All rights reserved Digital Cash and e-Wallets Digital cash –Stored electronically –Analogous to traditional bank account Customers deposit money –Overcomes drawbacks of credit cards Digital cash accounts often allow deposits in form of checks or bank transfers Allows merchants to accept customers without credit cards e-Wallets –Store billing and shipping information –Fill out forms at compatible sites in one click

 2004 Prentice Hall, Inc. All rights reserved Micropayments Micropayments –Merchants often charged fee for credit card transactions For small items, fee can exceed cost of item –Micropayments allow merchants to avoid this problem Add together all small transactions and pay percentage of that –Similar to concept of phone bill Pay one large sum monthly rather than tiny sum per each use

 2004 Prentice Hall, Inc. All rights reserved Smart Cards Smart cards –Memory cards Only allow for storage of information –Microprocessor cards Like tiny computers Can do processing in addition to storing data –Contact interface Card inserted into reading device for use –Contactless interface Data transmitted via wireless device inside card –Data and money protected by personal identification number (PIN)

 2004 Prentice Hall, Inc. All rights reserved Security Security is an increasingly important concern –Highly confidential data being transmitted all the time Credit cards, social security numbers, business data –Attackers attempt to steal, corrupt or otherwise compromise this data –Requirements for successful secure transaction: Privacy Integrity Authentication Authorization Non-repudiation –Also concerned with availability of site

 2004 Prentice Hall, Inc. All rights reserved Public-Key Cryptography Cryptography –Transforms data using cipher or cryptostream –Key acts as password that combined with cipher will decrypt encoded message into original message –Early cryptography relied on symmetric cryptography Same key used to encrypt and decrypt Problem of how to securely transmit key itself arose –Solution was public-key cryptography Two related but different keys used Sender uses receiver’s public key to encode Receiver decodes with private key Keys long enough that guessing or cracking them takes so much time it is not worth the effort

 2004 Prentice Hall, Inc. All rights reserved Public-Key Cryptography Fig. 38.3Encrypting and decrypting a message using public-key cryptography.

 2004 Prentice Hall, Inc. All rights reserved Public-Key Cryptography Digital signatures –Same concept as physical written signatures Authenticate signer Difficult to forge –Part of public-key cryptography –Generated by running phrase through hash function Returns hash value –Hash value for a phrase is over 99% guaranteed unique ie., two different phrases very unlikely to generate same value

 2004 Prentice Hall, Inc. All rights reserved Public-Key Cryptography Fig. 38.4Authentication with a public-key algorithm.

 2004 Prentice Hall, Inc. All rights reserved Public-Key Cryptography Public Key Infrastructure –Digital certificates Digital documents issued by certification authority Name of individual/group Public key Serial number Expiration date Signature of trusted authority –Certificate repositories Hold database of public digital certificates

 2004 Prentice Hall, Inc. All rights reserved Public-Key Cryptography PKI implementations –More secure than standard point-of-sale (POS) transactions Strong encryption can take decades to crack using current technology –RSA encryption popular choice for PKI Developed at MIT in 1977 –Pretty Good Privacy (PGP) Implementation of PKI Very popular way to encrypt Operates using web of trust

 2004 Prentice Hall, Inc. All rights reserved Cryptanalysis Searching for weaknesses in encryption –Try to find ways to decrypt ciphertext without having key –Not just done by malicious attackers Researchers want to find and fix flaws before attackers find and exploit them Cryptanalytic attacks –Common attack searches for relationship between ciphertext and key –Easier when all or part of decoded message known in advance Goal not to determine original message, but to discover key Allows attacker to forge messages from that sender

 2004 Prentice Hall, Inc. All rights reserved Cryptanalysis Preventative measures –Key expiration dates If attacker breaks or steals key, only useful for limited time –Exchange secret keys securely with public-key cryptography

 2004 Prentice Hall, Inc. All rights reserved Key-Agreement Protocols Public-key encryption not perfect solution –Requires significant computing power –Best used to exchange secret keys once, then use those keys for rest of transaction Key-agreement protocol –Protocol is set of rules for communication –Digital envelope most common Encrypt message using secret key Encrypt secret key with public-key encryption Both encrypted portions sent to receiver Receiver decrypts secret key using private key Receiver then uses decrypted secret key to decrypt message

 2004 Prentice Hall, Inc. All rights reserved Key-Agreement Protocols Fig. 38.5Creating a digital envelope.

 2004 Prentice Hall, Inc. All rights reserved Key Management Protecting private keys vital to security –Key generates possible source of vulnerability Susceptible to brute-force cracking If keys always chosen from small subset of all possible keys, much easier to crack Algorithm must generate random keys from large set of possible keys –Key should be very long –Common standard is 128 bits 2 to the 128 power

 2004 Prentice Hall, Inc. All rights reserved Secure Sockets Layer (SSL) SSL facilitates secure online communications –Developed by Netscape –Built into most browsers and servers Standard Internet communication process –Data sent and received through sockets Software mechanism that sends, receives and interprets network data –Transmission Control Protocol/Internet Protocol (TCP/IP) Standard protocol for Internet communication Controls how data is transferred and interpreted over networks –Messages broken down into packets Add ordering, routing and error-correction information

 2004 Prentice Hall, Inc. All rights reserved Secure Sockets Layer (SSL) Standard Internet communication process, cont. –Packet’s destination is an IP address Unique number that identifies computer on network –TCP puts received packets in order and checks for errors Can request retransmission if errors discovered –Only basic error checking exists Attackers can forge data with relative ease More secure methods necessary to increase integrity

 2004 Prentice Hall, Inc. All rights reserved Secure Sockets Layer (SSL) SSL –Layer on top of TCP/IP –Implements public-key encryption using RSA algorithm –Generates secret key referred to as session key Rest of transaction encrypted using this key –Messages still sent through TCP/IP after encryption step –Generally used for point-to-point connections One computer communicating with another directly –Transport Layer Security (TLS) another similar technology

 2004 Prentice Hall, Inc. All rights reserved Secure Sockets Layer (SSL) SSL, cont. –SSL does not protect data stored on server Only data that is currently traveling across network –Stored data should be encrypted by another means –Always take standard precautions against cracker attacks Making SSL more efficient –Encryption taxing on server resources –Dedicated SSL encoding/decoding hardware exists Peripheral component interface (PCI) cards Offload these tasks from CPU

 2004 Prentice Hall, Inc. All rights reserved WTLS Wireless Transport Layer Security –Security layer for Wireless Application Protocol (WAP) WAP used for wireless communication on cell phones and other devices –Provides authentication, integrity, privacy and denial-of- service protection –Encrypts data sent between WAP device and WAP gateway Where wireless network connects to wired network –Data translated from WTLS to SSL at gateway For an instant, data is unencrypted WAP gap No successful WAP gap attack ever reported

 2004 Prentice Hall, Inc. All rights reserved IPSec and Virtual Private Networks (VPN) Types of networks –Local Area Network (LAN) Connects physically close computers –Wide Area Network (WAN) Connect computers in multiple locations Employ private phone lines, radio waves or other techniques –Virtual Private Network (VPN) Leverage Internet to simulate LAN for multiple remote networks and wireless users Secure tunnel over Internet Data protected by encryption

 2004 Prentice Hall, Inc. All rights reserved IPSec and Virtual Private Networks (VPN) Internet Protocol Security (IPSec) –Developed by Internet Engineering Task Force (IETF) –Uses public-key and symmetric-key cryptography –Protects against data manipulation and IP-spoofing –Conceptually similar to SSL Secures entire network rather than point-to-point transaction –Often employs RSA or Diffie-Hellman encryption for key exchange –DES or 3DES used for secret key IPSec packets –Three components

 2004 Prentice Hall, Inc. All rights reserved IPSec and Virtual Private Networks (VPN) IPSec packets, cont. –Authentication header (AH) Verifies identity of sender and integrity of data –Encapsulating security payload (ESP) Encrypts packet to prevent reading while in transit –Internet Key Exchange (IKE) Authenticates encryption keys VPN shortcomings –Time consuming and complicated to initially set up –Must be careful who is given access VPN users essentially the same as LAN users Potentially have access to sensitive data

 2004 Prentice Hall, Inc. All rights reserved Security Attacks Security of greater concern than ever before –Great variety of attacks to defend against –Denial of Service (DoS) and Distributed DOS (DDoS) Flood server or network with data packets Prevents any legitimate traffic from passing through DDoS occurs when attacker gains control of multiple machines Uses them all to coordinate massive attack –Viruses Malicious programs Attach to or overwrite legitimate programs Vary in severity from minor irritations to complete destruction of hard drive data

 2004 Prentice Hall, Inc. All rights reserved Security Attacks Security of greater concern than ever before, cont. –Worms Similar to viruses Able to reproduce and spread over networks Generate extreme amount of traffic, slowing networks CodeRed and ILOVEYOU two infamous worms Attackers commonly called hackers or crackers –Traditionally, terms not interchangeable Hacker is a skilled programmer and computer user Cracker maliciously attacks computers for personal gain In practice, hacker has become blanket term for computer criminals

 2004 Prentice Hall, Inc. All rights reserved Security Attacks Protecting against attacks –Software exists to mitigate effects of these attacks –Anti-Virus software Detects and deletes viruses and worms before they execute

 2004 Prentice Hall, Inc. All rights reserved Network Security Network security –Allow authorized users access they need –Prevent unauthorized users from accessing and damaging network –Firewall a vital tool for network security Protects LANs from unauthorized traffic Placed between external Internet connection and computers on local network Blocks or allows traffic based on rules set by administrator Administrator must balance users’ needs for functionality against need for network security

 2004 Prentice Hall, Inc. All rights reserved Network Security Network security, cont. –Intrusion detection systems (IDS) Detect that an attacker has penetrated the firewall Monitor network traffic and log files If intrusion detected, immediately closes that connection and alerts administrator through various means

 2004 Prentice Hall, Inc. All rights reserved Legal Issues Internet poses new challenges to lawmakers –File-sharing could redefine copyright laws –Marketing techniques clash with users’ desire for privacy –Cyberspace requires rethinking many traditional legal ideas

 2004 Prentice Hall, Inc. All rights reserved Privacy U.S. Constitution has no explicit right to privacy –Regardless, privacy is vital concern to many people –Many sites track activity and personal information Provides personalization and sometimes better service Balanced against desire for marketers to not follow one’s every move or steal valuable information –Affects company employees as well as customers Companies install key loggers or keystroke cops Monitor what employees do on their system Right of company to ensure employees doing their jobs versus employee desire for privacy and free-speech –Idea of right to privacy still being created in courts

 2004 Prentice Hall, Inc. All rights reserved Defamation Defamation –Consists of slander and libel Slander is spoken Libel is written or spoken in a broader context than slander Proving defamation –Plaintiff must: Show that statement was written, spoken or broadcast Reasonably identify individual responsible Show that the statement is indeed defamatory Show that the statement was intended to cause harm and known to be false Show evidence of injury or actual loss

 2004 Prentice Hall, Inc. All rights reserved Sexually Explicit Speech Pornography is protected by First Amendment –Obscenity is not –Miller test has been deciding factor between the two Obscenity “appeals to the prurient interest” Lacks serious literary, artistic, political or scientific value –In cyberspace, community standards are different “Communities” not defined by physical location Issues of jurisdiction are unclear –Problem of what standard to hold Internet to Broadcast laws restrict content rather than audience Print laws use non-content-related means Restrict audience rather than content Either is possible on the Internet

 2004 Prentice Hall, Inc. All rights reserved Spam marketing –Can be useful or harmful –Unsolicited mass-mailings, or Spam, strongly frowned on Many Internet users received hundreds per day Content often at best irrelevant and at worst highly offensive Possible for children to receive pornography, for example –Legislation being created to deal with Spam epidemic –Software to combat spam also exists –Spammers constantly evolve to circumvent new measures –One of the toughest usability and privacy issues with Internet today

 2004 Prentice Hall, Inc. All rights reserved Copyrights and Patents Copyright –Protection given to author of original piece Protects an expression of idea, not idea itself –Incentive to create by guaranteeing credit for work Life of author plus 70 years –Digital technology has made copyright gray area Fair use vs. piracy Copies can be perfect, not cheap imitations –Movies and MP3-encoded music files hottest area of debate File-sharing programs lets users download copyrighted works freely Costs distributors and artists money Users want to sample music, enjoy lower prices

 2004 Prentice Hall, Inc. All rights reserved Copyrights and Patents Patents –Grant creator sole rights to a discovery –Designed to foster invention and innovation Guarantees new idea cannot be stolen from inventor –Possible to patent method of doing business Must be non-obvious to person skilled in relevant field –Also contentious area Some feel patents stifle rather than foster innovation 20-year duration may be too long in fast-paced software world Some companies file patents solely to profit from infringement lawsuits later on

 2004 Prentice Hall, Inc. All rights reserved XML and e-Commerce Extensible Markup Language (XML) –One parent of XHTML –Allows users to create customized tags to mark up data Share data in standard, easily-used format worldwide Portable between multiple applications and platforms –Some industries have standard XML formats already MathML CML XMI OSD –Facilitates Electronic Data Interchange (EDI)

 2004 Prentice Hall, Inc. All rights reserved Introduction to Wireless Technology and m-Business Wireless technology –One of technology’s fastest growing sectors –Brings communications and Internet everywhere –Wireless devices support increasing number of features –Convergence beginning to occur Features of several distinct products combined into one PDAs merging with cell phones

 2004 Prentice Hall, Inc. All rights reserved m-Business Mobile business –E-business enabled by wireless technology –Relatively new, but rapidly growing –Access critical business information anytime, anywhere Employees can conduct their duties more easily Customers can interact with online businesses in new ways and locations

 2004 Prentice Hall, Inc. All rights reserved Identifying User Location Location-identification technologies –Determine users’ physical location to within yards –Useful in wireless marketing Send promotion data when user is near relevant location –Great benefits to emergency services Quickly and accurately locate victims –Made possible by relationships between wireless providers, networks and users –Multipath errors can cause problems Signals reflecting off nearby objects

 2004 Prentice Hall, Inc. All rights reserved E911 Act Enhanced 911 Act –Standardize 911 service across mobile devices –Improve response time to calls made from cell phones –First phase requires cellular providers to disclose phone number of caller as well as location of nearest cell site –Second phase requires disclosure of location of caller to within 125 meters –Several benefits Callers often do not know their exact location If call breaks up, emergency responders can still send help

 2004 Prentice Hall, Inc. All rights reserved Location-Identification Technologies Methods of locating the user –Triangulation Analyze angle of signals from at least two fixed points –Information presented as geocode Latitude and longitude –Different methods have varying degrees of accuracy

 2004 Prentice Hall, Inc. All rights reserved Location-Identification Technologies

 2004 Prentice Hall, Inc. All rights reserved Wireless Marketing, Advertising and Promotions Wireless Marketing –Wireless technology provides unique opportunities –Augments, rather than replaces, traditional marketing Push and pull strategies –Pull Users request data to be sent in real-time –Push Company delivers messages at time it deems appropriate –Using either one, advertising should be opt-in User must have explicitly requested the service Otherwise it is essentially spam, creates ill-will toward the company

 2004 Prentice Hall, Inc. All rights reserved Wireless Marketing, Advertising and Promotions Effective wireless marketing –Must deliver right content at right time –Perfect match for location-identification technology –Advertisers much more likely to place and pay more for ads that are well-targeted and likely to generate response –Several challenges and obstacles Security Ensuring ads display properly on diverse devices Additional middle-men Selecting suitable publisher and transmission technology

 2004 Prentice Hall, Inc. All rights reserved Wireless Marketing, Advertising and Promotions Short Message Service –Deliver simple text-only messages –Interactivity is limited –Nearly no load time –Work well for quick, simple alerts

 2004 Prentice Hall, Inc. All rights reserved Wireless Payment Options Wireless payments (m-payments) –Must be secure and reliable, like standard online payments –Mobile Virtual Network Operators (MVNOs) Purchase bandwidth and re-brand with added services Option for banks to make micropayments profitable –M-wallets Users store billing and shipping information Recall with one click Promote convenience

 2004 Prentice Hall, Inc. All rights reserved Privacy and the Wireless Internet Privacy problems magnified on wireless devices –Transmissions can be intercepted –Users located accurately –Accepted standard is opt-in policy Users request to be sent information Consumer should always expect the information they receive No unauthorized information sharing with partners –Sometimes double opt-in User requests information, then has to confirm decision –Opt-out frowned upon Send users information unless they say to stop

 2004 Prentice Hall, Inc. All rights reserved Privacy and the Wireless Internet CITA –Cellular Telecommunications and Internet Association –Group that has created guidelines for consumer privacy –Outlined four guidelines Alert consumers when location being identified Always use opt-in marketing Consumers able to access their own information Same protections offered by all devices and carriers