Download presentation
Presentation is loading. Please wait.
Published byLeo Lucas Modified over 8 years ago
1
Chapter 8 E-Commerce Technologies Introduction to Business Information Systems by Mark Huber, Craig Piercy, Patrick McKeown, and James Norrie
2
Copyright 2008 John Wiley & Sons Canada Ltd. 2 Four Generations of E-commerce First generation: _________ content such as company information, online marketing, and company brochures Second generation: _________ content where Web page changes depending on a number of factors such as time and date, user profile, or browser location Third generation: growth in businesses’ ability to _________ transactions on the Web Fourth generation: increasing ___________ with external partners on the Web
3
Copyright 2008 John Wiley & Sons Canada Ltd. 3 First Generation: Establishing a Web Presence Basic technologies are still used: ___________________: the networks over which data travel _________: the application software that lets users request and view Web pages _________ protocol: the standardized rules for exchanging data over the Web _________: the language that guides the display of a requested page
4
Copyright 2008 John Wiley & Sons Canada Ltd. 4 Web Browsers A ________________ is the software that allows you to navigate the Web and to view content you find there Hypertext organizes content into units that are connected using associations called __________ Browsers typically include a _________ _________ _________ that make them easy to use
5
Copyright 2008 John Wiley & Sons Canada Ltd. 5 HTTP: Hypertext Transfer Protocol HTTP comprises a set of ____________ for formatting and transmitting messages over the Web HTTP is _________ and _________, meaning it forgets about requests and responses after they are complete This feature of HTTP requires _________________ to support e- commerce
6
Copyright 2008 John Wiley & Sons Canada Ltd. 6 HTML: Hypertext Markup Language ______________________ is the primary language for creating Web pages The browser interprets the HTML through the use of ____________, which are used to format the content of the Web page The tags, enclosed in angle brackets ( ), mark the placement and appearance of page ______________
7
Copyright 2008 John Wiley & Sons Canada Ltd. 7 Second Generation: Providing Interaction Providing interaction between the Web page and user requires _______________ based on user input and programming instructions.
8
Copyright 2008 John Wiley & Sons Canada Ltd. 8 HTML Forms The primary method of data input into a Web site is the HTML form which is composed of one or more _______________ These controls must match the data needs of the transaction and minimize chance of _________________
9
Copyright 2008 John Wiley & Sons Canada Ltd. 9 Storing Data on the Client Side To be able to carry out e-commerce transactions, it is necessary to store data about the customer on the _______________ One way to do this is to use a ________, which is small bit of data stored on the client machine and passed back and forth between it and the Web server When data remain on the client machine for a period of time, this is a _________ cookie
10
Copyright 2008 John Wiley & Sons Canada Ltd. 10 Making the Client-Side Dynamic and Interactive _________ languages like JavaScript are built into the Web page to add dynamic interaction such as ____________________ _________ technology is used for sharing information among different technologies An _____________ is a small program that a browser can download and execute A browser ______________ is a small software module that can work with the browser
11
Copyright 2008 John Wiley & Sons Canada Ltd. 11 Server-Side Programming When programs run on the Web server to provide dynamic interaction, this is known as ________________________________ With server-side programming, a business can: Deliver customized content Dynamically modify content for any page Access data stored on a server-side database and send it to the client’s browser Take action on queries and data sent from client Optimally manage traffic to the site
12
Copyright 2008 John Wiley & Sons Canada Ltd. 12 The n-Tier Infrastructure An e-commerce system is composed of various layers or ____________ with the number depending on what components are used A typical system is the ____________ system with a client tier (you and your browser), a Web server tier, an application server tier, and a database server tier
13
Copyright 2008 John Wiley & Sons Canada Ltd. 13 Third Generation: Supporting Transactions In the third generation of e-commerce, businesses recognized that they must deal with three issues to be successful: 1. ______________________________ 2. ______________________________ 3. ______________________________
14
Copyright 2008 John Wiley & Sons Canada Ltd. 14 Search Engines Internet _____ ________ make it possible for customers to find information When you search the Web, you are really searching a database that was created from _________________________________ Web sites are found by a __________ ________ and are submitted by humans An important consideration is how the database organizes or _______________ the Web data
15
Copyright 2008 John Wiley & Sons Canada Ltd. 15 Order and Payment Systems The four primary components of a typical e- commerce site are: 1. The shopping and ______________ 2. The _____________ account 3. The _____________ gateway 4. The _____________ system The __________________ system is the most popular e-commerce system for larger businesses where a customer wants to buy multiple products usually using a credit card
16
Copyright 2008 John Wiley & Sons Canada Ltd. 16 E-Commerce Security Most e-commerce security technologies relate to the _________________________ protocol, which allows a client and a server to communicate in a way that prevents eavesdropping or tampering A server that encrypts data using the SSL protocol is known as a ________________, which uses https instead of http _______________ are an important part of e-commerce security systems as they are used to authenticate users
17
Copyright 2008 John Wiley & Sons Canada Ltd. 17 Encryption The most common method of providing security to e-commerce transactions is ____________, which is the process of scrambling a message so that it is meaningful only to the person holding the key to deciphering it ______________________________uses the same private key to encrypt and decrypt a message. In contrast, a ________________________ system has two keys. The public key is freely distributed and used to encrypt messages coming to you; the private key remains secret and is only used to decrypt the messages encrypted with your public key
18
Copyright 2008 John Wiley & Sons Canada Ltd. 18 Fourth-Generation: Transforming Processes _____________ and ________________ are moving us into the realm of automatic interaction between computers For e-commerce, these technologies are improving the ability to exchange small amounts of data via the web and to standardize the support of transactions
19
Copyright 2008 John Wiley & Sons Canada Ltd. 19 eXtensible Markup Language (XML) XML, like HTML, uses _________ to mark up content and/or data so that software applications can recognize it The goal of XML is to _________________ and focus on what it means, while the goal of HTML is to describe how to __________ data Using XML, companies can define their own tags that their trading partners can understand
20
Copyright 2008 John Wiley & Sons Canada Ltd. 20 Web Services ___________________ are a standardized way for one computer program to request and run another computer program over the Internet A web service is a _____________________ software component Web services give companies the ability to do more e-commerce business, with more potential business partners, and in different ways than before at a reasonable cost Web services are based on a number of accepted ________________ that allows everybody to work on the same basis
21
Copyright 2008 John Wiley & Sons Canada Ltd. 21 Primary Web Service Standards StandardDescription The language used by web services for marking the exchanged data according to its meaning A simple XML-based protocol to let applications exchange information over HTTP A standard based on XML for formally defining a Web service A standard for setting up directories of web services. UDDI will allow you to discover what web services are available on the network
22
Copyright 2008 John Wiley & Sons Canada Ltd. 22 Copyright Copyright © 2008 John Wiley & Sons Canada, Ltd. All rights reserved. Reproduction or translation of this work beyond that permitted by Access Copyright (The Canadian Copyright Licensing Agency) is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons Canada, Ltd. The purchaser may make back-up copies for his or her own use only and not for distribution or resale. The author and the publisher assume no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information contained herein.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.