E-Commerce. Introduction to Internet A network of networks that connects computers across the world. It is growing rapidly: –Host computers –Users –Information.

Slides:



Advertisements
Similar presentations
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Advertisements

By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Chapter 15 The Third Component: Powerful Networks.
Telecommunication, Internet, and E-Commerce. Communication Channel Media Bandwidth: The speed at which information is transmitted over a communication.
E-Commerce. Internet It is a network that follows the TCP/IP protocol. –Transmission Control Protocol – handles communications between applications. A.
COMPUTER APPLICATIONS TO BUSINESS ||
CHAPTER THE INTERNET, THE WEB, AND ELECTRONIC COMMERCE 22.
E-Commerce Michael Andrianus – Vincentius
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
11/12: The Internet: E-Commerce & E-Business What is the Internet? –Parts of the Internet –Internet & WWW basics –Searching the WWW Benefits of the Internet.
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
June 2009 Memory Reed Harris County High School What is E-Commerce? MKT-EM-2.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
Marketing Management Online marketing
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
7/19: Internet & eCommerce How companies use the Internet –Collaboration (internal & external) –Communication (internal & external): , etc. –Gather.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Internet Architecture and Governance
Systems that support electronically executed business transactions.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
The Internet, The Web, and Electronic Commerce Chapter 2.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
WEB SERVER SOFTWARE FEATURE SETS
Understand Internet Security LESSON Security Fundamentals.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Information Networks. Internet It is a global system of interconnected computer networks that link several billion devices worldwide. It is an international.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Chapter 5 – E-commerce and Enterprise Systems
The Internet & World Wide Web
What is Commerce According to Dictionary.com
E-Commerce Security.
Internet.
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

E-Commerce

Introduction to Internet A network of networks that connects computers across the world. It is growing rapidly: –Host computers –Users –Information It is a network that follows the TCP/IP protocol (packet switch network).

Internet protocol –Transmission Control Protocol – handles communications between applications. A message is divided into pieces called packets. Packets are numbered and may be transmitted by different routes. –Internet Protocol – handles communications between network addresses. A computer on the internet is assigned an unique address, IP address, which consists of 4 numbers (each number is less than 256) separated by period. Exanple,

Domain Name System Domain: –.com,.net,.org,..edu,.int,.gov –.info,.biz,.name,.etc. Domain names are the familiar, easy-to- remember names for computers on the Internet. –Yahoo.com Each domain name correlates to assigned IP address: –Yahoo.com –

Organizations that Regulate Internet ICANN (Internet Corporation for Assigned Names and Numbers):have responsibilities in Internet Protocol addresses and domain names. Domain name registry

Examples of Internet Services World Wide Web: –A system of interlinked, hypertext documents that runs over the Internet. –Web publishing and browsing FTP - File Transfer Telnet

Intranet It is a corporate network that functions with Internet technologies, such as browsers, using Internet protocols. Major applications: –Corporate/department/individual web pages –Database access –Interactive communication –Document distribution

Extranet It is a network that links the intranets of business partners over the Internet by Virtual Private Network. Virtual Private Network: –A secure network that uses the Internet as its main backbone network to connect the intranets of a company’s different locations, or establish extranet links between business partners. Improved communications between business partners

E-Commerce Buying and selling, and marketing and servicing of products and services, and information via computer networks.

Broad Band & Economy According to the study released by Connected Nation, A 7 percent increase in broadband adoption would: –create 2.4 million jobs across the U.S; –save $6.4 billion in vehicle mileage –U.S. residents would save 3.8 billion hours a year by conducting transactions online, at a cost-savings of $35.2 billion, according to the study. – U.S. is behind other nations – broadband-penetration-trails-s-korea-estonia.ars

Retail E-Commerce forecast U.S.A: aspx aspx Asia : ductid= Gas Price Impact: consumers-is-building.html?puc=tsczacks&cm_ven=tsczacks consumers-is-building.html?puc=tsczacks&cm_ven=tsczacks Impact of population density: –Hong Kong: internet-economy-lags-behind-south-korea-japan/ internet-economy-lags-behind-south-korea-japan/ Impact of E-Commerce Security: – consumers-still-wary-online-shopping

E-Commerce Models B2C: Storefront model –E-tailing (electronic retailing) –Shopping cart, on-line shopping mall B2B: –Electronic Data Interchange (EDI) –Electronic Exchange: An electronic forum where manufacturers, suppliers, and competitors buy and sell goods. Example: Global Sources and WorldWide Retail Exchange (WWRE) C2C: –Auction model: e-Bay Etc.

Channel Conflict For example, a manufacturing company may have a large, established dealer network. The channel conflict exists, when the companies tries to open another channel, such as an online store where customers can purchase goods directly from the company. This may alienate existing dealers, since they may feel that they are bypassed. Web presence without online store –Obagi Skin Care –Anthon Berg Chocolate

E-Payment Methods Online credit card transaction: –Card-not-present transaction PayPal: Google Checkout: –

M-Business E-Business enabled by wireless communication. –Cell phone, PDA

Location Based Services Location-Identification Technologies: –Geocode: Longitude, latitude Global Positioning System (GPS) Cell phone –Angle of Arrival (AOA)

E-Learning Electronic learning or eLearning is a general term used to refer to computer-enhanced learning. Many higher education, for-profit institutions, now offer on-line classes. The Sloan report, based on a poll of academic leaders, says that students generally appear to be at least as satisfied with their on-line classes as they are with traditional ones. Example: GIS online course – p

e-Government It refers to government’s use of information technology to exchange information and services with citizens, businesses, and other arms of government.

Increase Traffic to Website Search engine optimization: – Tips: – Grow your business with Google –Google AdWords Yahoo!'s Open Search Platform –

Internet Security Authenticity: Is the sender/receiver of a message who they claim to be? Privacy: Are the contents of a message secret and only known to the sender and receiver? Integrity: Have the contents of a message been modified during transmission? Nonrepudiation: Can the sender of a message deny that they actually sent the message?

Encryption (Cryptography) Plain text: the original message in human- readable form. Ciphertext:the encrypted message Encryption algorithm: the mathematical formula used to encrypt the plain text. Key: the secret key used to encrypt and decrypt a message.

Certificate A certificate is a digital document issued by a trusted third-party certificate authority (CA). A certificate contains records such as a serial number, user’s name, owner’s public key, name of CA, etc. Example of CA: VeriSign, U.S. Postal Service.

Online Transaction Security Protocol Secure Sockets Layer (SSL) –Developed by Netscape –SSL implements public key technology using the RSA algorithm and digital certificate to authenticate the server in a transaction and protect private information.

Tech heavyweights join OpenID Foundation board IBM, Google, Microsoft, Yahoo and VeriSign have joined the board of the OpenID Foundation, which puts consumers a little closer to being able to use a single sign-on when they surf the Web. It is simpler: People no longer have to remember multiple passwords or re-enter their personal information every time they visit a new site. It is also more secure because it protects against certain types of online attacks.

Cookies Designed to hold information about a user. –Personalized web page Created by a web site and saved on the visitor’s machine. It contains: –Web site that sets the cookie. –One or more pieces of data. –Expiration date for this cookie. Cookies directory: Browser sends cookie with the URL when you visit the site that issued the cookie.