E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.

Slides:



Advertisements
Similar presentations
E-Commerce in Business
Advertisements

By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Cryptographic Technologies
Telecommunication, Internet, and E-Commerce. Communication Channel Media Bandwidth: The speed at which information is transmitted over a communication.
E-Commerce. Introduction to Internet A network of networks that connects computers across the world. It is growing rapidly: –Host computers –Users –Information.
E-Commerce. Internet It is a network that follows the TCP/IP protocol. –Transmission Control Protocol – handles communications between applications. A.
E-Commerce Chapter 5. Electronic commerce : E-commerce : eCommerce o Is Trading in products or services using computer networks, such as the Internet.
Categories of E-Commerce Models
ELECTRONIC COMMERCE. CONTEXT: Definition of E-Commerce. History of E-Commerce. Advantages and Disadvantages of E-Commerce. Types of E-Commerce. E-Commerce.
E-commerce E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. In this section: E-commerce.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
E-Tailing Electronic Retailing or E-Tailing - is the sale of goods or services through the internet. This can include: business-to-business sales (B2B)
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
“E-commerce: Business Models” Academic Year 2015.
Ecommerce … or electronic commerce refers to systems that support electronically executed business transactions. B2C B2B C2C In this section: Ecommerce.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
E-Commerce Michael Andrianus – Vincentius
INE1020: Introduction to Internet Engineering 6: Privacy and Security Issues1 Lecture 9: E-commerce & Business r E-Commerce r Security Issues m Secure.
Supporting Technologies III: Security 11/16 Lecture Notes.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
EFirm & eCommerce Digital Firm. Contents 1. Introduction 2. The opportunities of technology 3. Electronic Commerce 4. Payment systems 5. Management challenges.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Telecommunication, Internet, and E-Commerce. Communication hardware Communication channel Communication devices.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
© 2004 Ken Baldauf, All rights reserved. E-commerce Transaction Processing Overview of Electronic and Mobile Commerce E-commerce Applications E-commerce.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
E-Commerce Taruna Diyapradana PBM. What is E-Commerce? E-Commerce is the trading in products and/or services conducted via computer networks.
Copyright © 2007 Pearson Education Canada 13-1 Chapter Thirteen Marketing and the Internet with Duane Weaver.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
7/19: Internet & eCommerce How companies use the Internet –Collaboration (internal & external) –Communication (internal & external): , etc. –Gather.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Chapter 6 E-COMMERCE: DIGITAL MARKETS, DIGITAL GOODS.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Public Key Encryption.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
Systems that support electronically executed business transactions.
Exploring E-Commerce Mohammed Arif Mazumder Sr. Lecturer Daffodil International University.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Ashima Wadhwa Exploring E-Commerce Basics. What is e-Commerce and e-business? Electronic commerce (EC, or e- commerce) describes the process of buying,selling,
Systems that support electronically executed business transactions.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
E-commerce, or electronic commerce, refers to systems that support electronically executed business transactions. E-commerce In this section: E-commerce.
Web Development & Design Foundations with HTML5 8th Edition
What is Commerce According to Dictionary.com
Ecommerce Refers to systems that support electronically executed business transactions. Increasingly, buyers and sellers are turning to the web to buy.
E-Commerce Security.
Presentation transcript:

E-Commerce

Buying and selling, and marketing and servicing of products and services, and information via computer networks.

Broad Band & Economy According to the study released by Connected Nation, A 7 percent increase in broadband adoption would: –create 2.4 million jobs across the U.S; –save $6.4 billion in vehicle mileage –U.S. residents would save 3.8 billion hours a year by conducting transactions online, at a cost-savings of $35.2 billion, according to the study.

E-Commerce Models B2C: Storefront model –E-tailing (electronic retailing) –Shopping cart, on-line shopping mall B2B: –Electronic Data Interchange (EDI) –Electronic Exchange: An electronic forum where manufacturers, suppliers, and competitors buy and sell goods. Example: Global Sources and WorldWide Retail Exchange (WWRE) C2C: –Auction model: e-Bay, Craig's List C2B: A business model in which consumers (individuals) offer products and services to companies and the companies pay them. – –Amazon Affiliate program: Etc.

M-Business E-Business enabled by wireless communication. –Cell phone, PDA

QR Code-Enabled Virtual Store Tesco Subway virtual store: – subway-virtual-store/ subway-virtual-store/ Well.ca Opens QR Code-Enabled Virtual Store in Downtown Toronto: – code-enabled-virtual-store-in-downtown- toronto/ code-enabled-virtual-store-in-downtown- toronto/

Location Based Services Location-Identification Technologies: –Geocode: Longitude, latitude Global Positioning System (GPS) Cell phone –Angle of Arrival (AOA)

E-Payment Online credit card transaction: –Card-not-present transaction PayPal: Google Checkout: – vice=sierra&continue= com/main?upgrade%3Dtrue&hl=en_US&nui= 1&ltmpl=default&sacu=1https://accounts.google.com/ServiceLogin?ser vice=sierra&continue= com/main?upgrade%3Dtrue&hl=en_US&nui= 1&ltmpl=default&sacu=1

Channel Conflict For example, a manufacturing company may have a large, established dealer network. The channel conflict exists, when the companies tries to open another channel, such as an online store where customers can purchase goods directly from the company. This may alienate existing dealers, since they may feel that they are bypassed.

Increase Traffic to Website Search engine optimization: – –Search Engine Relevancy Reviewed – Tips: – Grow your business with Google –Google AdWords Yahoo!'s Open Search Platform –

Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message secret and only known to the sender and receiver? Integrity: Have the contents of a message been modified during transmission? Nonrepudiation: Can the sender of a message deny that they actually sent the message?

Encryption (Cryptography) Plain text: the original message in human- readable form. Ciphertext:the encrypted message Encryption algorithm: the mathematical formula used to encrypt the plain text. Key: the secret key used to encrypt and decrypt a message.

Encryption Example Digits: 0-9, Encryptor: –Replace each digit by Mod(Digit + Key, 10) Key’s value is from 0 to 9 –If Key = 7, then: 0 -> 7, 1->8, 2->9, 3->0, 4->1, 5->2 Decryptor: –Replace each digit byMod(Digit + (10-Key), 10) –If key=7, then 7->0, 8->1, 9->2, 0->3

Encryption Algorithms Private key encryption –symmetric cryptography Public key encryption –asymmetric cryptography Digital signature Digital certificate

Private Key (secret Key) Encryption The same key is used by a sender (for encryption) and a receiver (for decryption) The key must be transmitted to the receiver. Example: –DES (Data Encryption Standard) algorithm with 56-bit key

Public Key Encryption Uses two different keys: a public and a private key. Receiver’s public key must be delivered in advance. Sender uses receiver’s public key to encrypt the message and receiver uses private key to decrypt the message (Sender can be sure the receiver is the true receiver) Example: –RSA (Rivest, Shamir, and Adelman) algorithm with 512-bit to 1024-bit key. Note: Although the two keys are mathematically related, deriving one from the other is “computationally infeasible”.

Digital Signature It is used for the authentication and nonrepudiation of senders.

Tech heavyweights join OpenID Foundation board IBM, Google, Microsoft, Yahoo and VeriSign have joined the board of the OpenID Foundation, which puts consumers a little closer to being able to use a single sign-on when they surf the Web. It is simpler: People no longer have to remember multiple passwords or re-enter their personal information every time they visit a new site. It is also more secure because it protects against certain types of online attacks.