Date: April 20 th, 2015. Monday Enevening. Faculty of Computing and ICT Under Department: Bachelor of Business in Information Technology Senior Lecturer:

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Steps towards E-Government in Syria
ITU Regional Seminar on E-commerce Bucharest, Romania May 2002 National E-commerce Strategies for Development Dr. Susanne Teltscher United Nations.
From e-Government to e-Governance: The OECD Experience Elizabeth Muller E-Government Project OECD SitExpo February 1004, Casablanca - Morocco.
AFACT eCOO WG interim meeting - Conference Call 1st March of 2011 Mahmood Zargar eCOO Experiences and Standards.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
E-commerce Strategies
Electronic Contracts- eSign & UETA Copyright, Peter S. Vogel,
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Chapter 1: The Context of SA&D Methods
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
JCSD-aw Citizenship in an e-World Johnston Community School District.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cyber Law & Islamic Ethics
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Use of Electronic Digital Signature in the Russian Federation.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
National Smartcard Project Work Package 8 – Security Issues Report.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Possible WebQuest type links  
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
Building User Trust Online Sarah Andrews International Conference on the Legal Aspects of an E-Commerce Transaction The Hague October 2004.
Business Computing 550 Lesson 1. Fundamentals of Information Systems, Fifth Edition An Introduction to Information Systems in Organizations.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Electronic Banking & Security Electronic Banking & Security.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
ADDRESS BY MINISTER OF COMMUNICATIONS Dr Ivy Matsepe-Casaburri LAUNCH OF ELECTRONIC COMMERCE POLICY July 1999.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Digital Signature.
E-Commerce for Developing Countries (EC-DC)
Presentation transcript:

Date: April 20 th, Monday Enevening. Faculty of Computing and ICT Under Department: Bachelor of Business in Information Technology Senior Lecturer: Ahmed Abdillahi Sanco. Ahmed Abdillahi Sanco1

All the States and Countries over the world has a different in view for customers and it’s transaction by:  Customer Protection  Privacy  Culture and  Language Overall awareness of the issues has been defined internationally, The legal framework, which traditionally relies on paper-based commerce procedures and requirements such as hand-written signatures, is in the process of being adapted to these new technologies. Chapter Five : International Legal Considerations in E-commerce

At the global level, the availability of the United Nations Commission on International Trade Law (UNCITRAL) Model Law on electronic commerce has adopted the kind of transactions that can be carried on over the Internet are: a. Transactions involving physical goods, (i.e. Amazon.com) b. Transactions involving non electronic services (i.e. law, accounting, architecture) c. Transactions involving electronic services (i.e. Aol, Yahoo, software design) d. Transaction involving information (i.e. New York Times on-line, Lexus, pornography)

e. Financial transactions (i.e. on-line banking, on- line gambling, on-line payment mechanisms) f. Hybrid transactions As Electronic commerce is a key element in the OECD (the Organization For Economic Cooperation And Development)Ìs vision for economic growth and improved social conditions, and as electronic commerce is inherently trans border and its development will depend on international solutions, On October 7-9, 1998, nearly a thousand participants, including Ministers and high-level officials from all 29 OECD Member countries,

12 non-member countries, 12 international organizations, and representatives from business, trade unions, consumer groups and other non- governmental organizations gathered in Ottawa for a Ministerial Conference ÏA Borderless World - Realizing the Potential of Global Electronic Commerce has those four reasons or topics. 1. Building trust for users and consumers; The use of technology and the implementation of policy designed to protect privacy and collection of personal data and incorporate appropriate redress mechanisms for misuse of the above.

2. Establishing ground rules for the digital marketplace; Consumers and business people are looking to governments to ensure that the rules in the virtual world are equivalent to, transparent, and as predictable as those in the physical world as close as possible. 3. Enhancing the information infrastructure for electronic commerce; Creating universal and affordable access which depends upon appropriate telecommunication policies and regulatory frameworks.

4. Maximizing the benefits; Use has to be widespread which links citizens of the world. This area by outlining who is doing what to solve these various problems together: 1. The OECD Action Plan for Electronic Commerce; 2. The Report on International and Regional Bodies: Activities and Initiatives in Electronic Commerce; and 3. The Global Action Plan for Electronic Commerce prepared by Business with Recommendations for Governments.

 Electronic signature and Authentication The terms “electronic authentication” and “electronic signature” are used to refer to various techniques currently available on the market or still under development for the purpose of replicating in an electronic environment some or all of the functions identified as characteristic of handwritten signatures or other traditional authentication methods. in 1996 provides a framework to adapt legislation. The most common type of International legal consideration is :-

Typical examples in Legal Consideration include the following: 1. Notarization the act of signing has a particular formal significance due to the reinforced trust associated with a special ceremony. This is the case, for instance, with notarization, i.e. the certification by a notary public to establish the authenticity of a signature on a legal document, which often requires the physical appearance of the person before the notary;

2. Generation of a digital signature To sign a document or any other item of information, the signatory first delimits precisely the borders of what is to be signed. Then a hash function in the signatory’s software computes a hash result unique (for all practical purposes) to the information to be signed. The signatory’s software then transforms the hash result into a digital signature using the signatory’s private key.

3. Verification of digital signature Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key. Verification of a digital signature is accomplished by computing a new hash result for the original message, by means of the same hash function used to create the digital signature.

4. Other uses of digital signature technology Digital signature technology has a much broader use than merely to “sign” electronic communications in the same manner that handwritten signatures are used to sign documents. Indeed, digitally signed certificates are often used, for instance, to “authenticate” servers or websites, for example in order to guarantee to their users that the server or website is the one it purports to be or is genuinely attached to the company that claims to run the server or website.

5. Public and private keys A complementary key used for digital signatures is named the “private key” which is used only by the signatory to create the digital signature and should be kept secret, while the “public key” is ordinarily more widely known and is used by a relying party to verify the digital signature. The private key is likely to be kept on a smart card or to be accessible through a personal identification number (PIN) or a biometric identification device, such as thumbprint recognition.

Computer Crimes The Department of Justice categorizes computer crime in three ways:  The computer as a target - attacking the computers of others or funny to make anger (spreading viruses is an example).  The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world.  The computer as an accessory - using a computer to store illegal or stolen information which can be some times discovered that you stolen on it.

Ten Command of Computer Ethics These are the Ethics an IT Person can avoid to loose his dignity because The Bad thing will fallow you for ever.  Do not use a computer to harm other people.  Do not interfere with other people's computer work or resources without authorization.  Do not snoop around in other people's files or other people's intellectual output..  Do not use a computer to steal.  Do not use a computer to bear false witness.  Do not use or copy software for which you have not paid.  Do not use a computer in ways that show consideration and respect.