Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.

Slides:



Advertisements
Similar presentations
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Advertisements

Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
Why is there Concern about the Effect of the Internet in Society? E-Commerce: Jason Logan eBay: Ben King Hacking: Khyle Westmoreland Censorship: Ben King.
Legislation in ICT.
Network Neutrality Professor: Robert J. Irwin Computer Science 101 Spring Semester 2007 Describe The Concept: Brandon Niezgoda, class of 2010 Arguments.
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
F.C.C. Seeks to Protect Free Flow of Internet Data Comments: Here's my take: if you provide service to the end-user, you only take money from the end-user.
ELECTRONIC COMMERCE. CONTEXT: Definition of E-Commerce. History of E-Commerce. Advantages and Disadvantages of E-Commerce. Types of E-Commerce. E-Commerce.
E-Commerce E-Marketing By: Sadiq Ahmed Shariff S ail.com E-Business.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Network Neutrality By: Jacob Hansen CPE 401. Introduction What is network neutrality? Who wants to get rid of it? Why is it important? What is at stake?
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
G041: Lecture 16 Section B Revision Questions
 In most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security,
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
MIS 213 Spring Why are we talking it?  It’s a major problemproblem  What do you think of?
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
E-Commerce Taruna Diyapradana PBM. What is E-Commerce? E-Commerce is the trading in products and/or services conducted via computer networks.
Dimensions of E – Commerce Security
Introducing the networks and the Internet By Cody Gibbs.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Jeopardy: Digital Citizenship Please use presentation mode!
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
E-COMMERCE. Definition of E-commerce It is the purchasing, selling and exchanging of goods and services over computer networks through which transactions.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
Hacking by Tiffany Duff Computing in the Modern World Ms. Stewart.
Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Digital Citizenship By : Danielle McDonald. Digital Access Digital Access is the ability for people in different countries to access digital technology.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
The 9 Themes of Digital Citizenship By: Austin. Digital Access Full electronic participation in society. Being able to access technology through the internet.
Nine Elements of Digital Citizenship Isabella Freijah.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Ecommerce Application Development For Online Selling Via Web and Mobile Application Electronic commerce, commonly known as e-commerce, is a type of industry.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Privacy Issues in E-Commerce Seydou Ouattara CIST 2100 OAT Talk.
 Electronic commerce, commonly known as E- commerce or E- Commerce, is trading in products or services using computer networks, such as the Internet.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Developing a Network Security Policy By: Chris Catalano.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
We celebrate 26/11 every year as the CITIZEN ACTION PLEDGE DAY
Legislation in ICT.
E-Commerce Basics You know your excited.
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Chapter 5 Electronic Commerce | Security
cybercrime Presented to you by : NAMES MATRIC NO
McAfee Activate  McAfee offers advanced security solutions to the computer users across the globe.  It offers a wide selection of antivirus and internet.
Presented By AB web Technologies.  ecommerce refers to commercial transactions conducted online. This means that whenever you buy and sell something.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 5 Electronic Commerce | Security
Prepared By : Binay Tiwari
Objectives Telecommunications and Network Physical and Personnel
Legislation in ICT.
LO1 - Know about aspects of cyber security
Dark Web Domain Status Report
A Model For Network Security
Presentation transcript:

Electronic Commerce By: Shannon McManus

Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually done though Internet or intranets  Allows people across the globe to exchange goods or services, instantaneously without actually being present in the same place.

Types of EC

Network Neutrality  The principle that Internet users should be in control of what content they view and what applications they use on the Internet  Three rules  Robust Transparency  No Blocking  No unreasonable discrimination  I think that net neutrality is a good idea because Internet should be accessed by anyone.

Cyber Intelligence Sharing and Protecting Act  Allows sharing of Internet activity between the government and companies.  Proposed to help the government investigate cyber threats and help ensure security on the Internet.  I feel like this would help the greater good by enforcing cyber hacks, and allow E-Commerce to continue to thrive because of this increased security.

EC Security  Process of Securing your information  There is no way to fully protect against hackers and phishing without legislation  As long as technology is advancing, there will always be new ways for hackers to illegally gain access to people’s information.