Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

Network+ Guide to Networks, Fourth Edition
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Ethical and Social Issues in Information Systems
Chapter 10 Site Architecture McGraw-Hill/Irwin Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved.
8.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
Copyright © 2002 Pearson Education, Inc. Slide 4-1 Choosing the Hardware for an E-commerce Site  Hardware platform  Refers to all the underlying computing.
Copyright © 2002 Pearson Education, Inc.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment ELC 200 Day 24.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
ELC 200 Day 9. Agenda Questions? Assignment 2 is Due Assignment 3 is posted  Due Feb. 25, 2014  assignment3.pdf assignment3.pdf Finish Building an E-commerce.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Test Your Tech The dangers of phishing include A. Sharp hooks and nightcrawlers. B. Credit-card fraud at a look-alike Web site that mimics your bank. C.
T U T O R I A L  2009 Pearson Education, Inc. All rights reserved Bookstore Web Application Introducing Visual Web Developer 2008 Express and the.
Week 7 Lecture Web Database Development Samuel Conn, Asst. Professor
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Chapter 10 Developing a Web-Based Online Shopping Application (I)
Functions of a Database Management System
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Chapter 8 The Internet: A Resource for All of Us.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Privacy CSC385 Kutztown University Fall 2009 Oskars J. Rieksts.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Chapter 7: E-Commerce Security and Payment system
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Ethical and Legal Issues Information Systems 337 Prof. Harry Plantinga.
ELC 200 Day 9. Agenda Questions? Assignment 2 Corrected  All A’s and one A+ Assignment 3 Posted  Due October 8  assignment3.pdf assignment3.pdf Quiz.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Computer Security By Duncan Hall.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Chapter-04 Building an Ecommerce Website. Building an E-commerce Site: A Systematic Approach The two most important management challenges in building.
Facebook privacy policy
Chapter 7. Identifying Assets and Activities to Be Protected
Section 12.1 Section 12.2 Discuss the functions of a Web site
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Ethical and Social Issues in Information Systems
Unit# 5: Internet and Worldwide Web
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
Ethical and Social Issues in Information Systems
Management Information Systems: Managing the Digital Firm
Presentation transcript:

Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities

Created by, Author Name, School Name—State Data and Information PART 3

Created by, Author Name, School Name—State WORKING ONLINE eCommerce and Interactive Networking chapter 16

Copyright © 2003 Pearson Education, Inc. Slide 16-4 CHALLENGES OF ECOMMERCE

Copyright © 2003 Pearson Education, Inc. Slide 16-5 THE CHALLENGE OF VARIATION > Global Customers > Many Business Rules > Diverse Products and Information > Diverse Shopping Experiences

Copyright © 2003 Pearson Education, Inc. Slide 16-6 STRUCTURE OF THE SETTING > The Client/Server Structure > Many Brief Relationships > Creating Web Pages On-the-Fly > Middleware

Copyright © 2003 Pearson Education, Inc. Slide 16-7 Figure The basic client/server structure, as illustrated by the browser (client) requesting Web pages provided by the Web server.

Copyright © 2003 Pearson Education, Inc. Slide 16-8 Figure Client/server relationships as they might evolve over time.

Copyright © 2003 Pearson Education, Inc. Slide 16-9 DISCRETE EVENTS > The Discrete Event Problem > One Solution with Cookies > Another Solution Without Cookies

Copyright © 2003 Pearson Education, Inc. Slide Figure An imaginary interaction between client and server. A cookie stored at the client lets the server connect independent events into a dialog. Notice that the cookie also connects to an earlier session when the customer gave an address, credit card number, and probably mailing address.

Copyright © 2003 Pearson Education, Inc. Slide Figure A three-tier system in which backend tasks are performed by CGI (Common Gateway Interface).

Copyright © 2003 Pearson Education, Inc. Slide Figure Middleware performs an operation on a three-tier system; the process moves to the right; the Client Computer boxes represent one computer at different points in time; similarly for the Server Computer boxes.

Copyright © 2003 Pearson Education, Inc. Slide TRANSACTIONS DO THE WORK > Simultaneous Requests > Transactions Interleaved > Serialized Behavior: Transactions Happen One at a Time

Copyright © 2003 Pearson Education, Inc. Slide Figure Correct processing of two withdrawals from a bank account.

Copyright © 2003 Pearson Education, Inc. Slide Figure Two withdrawal transactions interleaved in time produce the wrong balance—that is, corrupt the database.

Copyright © 2003 Pearson Education, Inc. Slide THE STANDARDS CASE > Common Language > Web Standard Languages > Importance of Standards to Communicate > Agreeing on Standards

Copyright © 2003 Pearson Education, Inc. Slide REDUNDANCY IS VERY, VERY, VERY GOOD > A Fault Recovery Program for Business > Backing Up a Personal Computer — Do it on a regular basis — Segregate the backup data from “temp” data. — What can you afford to lose — What can you easily recover > A backup strategy

Created by, Author Name, School Name—State SHHH, IT’S A SECRET Privacy and Digital Security chapter 17

Copyright © 2003 Pearson Education, Inc. Slide PRIVACY: WHOSE INFORMATION IS IT? > How Could the Information Be Used? > Modern Devices and Privacy > Controlling the Use of Information

Copyright © 2003 Pearson Education, Inc. Slide Figure Voluntary Compliance Report Card. Fewer than a tenth of.com Web sites gathering personal information as of March 1999 posted a privacy statement that included five of the Fair Information Practices components. Source: Mary Culnan, Georgetown Internet Privacy Policy Survey, 1999.

Copyright © 2003 Pearson Education, Inc. Slide A PRIVACY DEFINITION > Threats to Privacy > Voluntary Disclosure

Copyright © 2003 Pearson Education, Inc. Slide FAIR INFORMATION PRACTICES > Five HEW Fair Information Principles > OECD Fair Information Practices

Copyright © 2003 Pearson Education, Inc. Slide Five HEW Fair Information Principles – Health Education and Welfare > There must be no personal data record-keeping systems whose existence is secret > There must be a way for a person to find out about information on record and use > There must be a way for a person to prevent info used for one purpose to be used for another > There must be a way for the person to correct or amend their informaiton > Any organization creating maintaining or disseminating records must ensure the reliability of the data…

Copyright © 2003 Pearson Education, Inc. Slide OECD Fair Information Practices > Organization of Economic Cooperation and Development > Limited Collection principle > Quality principle > Purpose principle > Use limitation principle > Security principle > Openness principle > Paricipation principle — Do I want to participate or not > Accountability principle. > Data Controller – person or office that sets policy regarding information.

Copyright © 2003 Pearson Education, Inc. Slide COMPARING PRIVACY ACROSS THE ATLANTIC > U.S. Laws Protecting Privacy — Privacy Act of 1974 but realize Patriot Act supercedes in some aspects – governmental regulation — US regulates by business sector > Privacy Principles: European Union

Copyright © 2003 Pearson Education, Inc. Slide THE COOKIE MONSTER > Sharing Cookies > Third-Party Cookies > Managing Your Privacy

Copyright © 2003 Pearson Education, Inc. Slide Protecting your computer against unwanted invasion > Ads > Spy bots > Other malicious programs

Copyright © 2003 Pearson Education, Inc. Slide Easiest > Restricted user account — dis – cannot easily download. Must go to admin account for any kind of program installation and download — But…it is also hard for mal-ware to infect your computer > Keep OS up to date > Keep Web browsers up to date > Restrict what can/cannot be done through web

Copyright © 2003 Pearson Education, Inc. Slide RUNSAFE – Common sense approaches to safety > JMU recommendations for safety on your home computer. > /startsafe/startsafe-home.shtml /startsafe/startsafe-home.shtml >

Copyright © 2003 Pearson Education, Inc. Slide Last Chapters > Explore the ideas of “creativity” and computers > Discuss the Universality Principle — Any task you can perform on one computer you can perform on another — Basic tasks: Add, Subtract, Test, Load, Store, and Branch > Continuing to learn.