Jozef Goetz, 2013 1 © 2011-13 Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.

Slides:



Advertisements
Similar presentations
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
Advertisements

CP3397 ECommerce.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Electronic Transaction Security (E-Commerce)
Principles of Information Systems, Sixth Edition 1 Electronic Commerce Chapter 8.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
E-Commerce Chapter 5. Electronic commerce : E-commerce : eCommerce o Is Trading in products or services using computer networks, such as the Internet.
Electronic Commerce Systems
Security on the Internet Jan Damsgaard Dept. of Informatics Copenhagen Business School
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
E-Business – Technology and Networks Teodora Bakardjieva Prof. Dr., Varna Free University Varna Free University.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 7 TH EDITION Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
1 Web Developer Foundations: Using XHTML Chapter 12 Key Concepts.
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
E-Business and E-Commerce
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Chapter 11 E-Commerce.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 10B Doing Business in the Online World.
The Internet, the Web, and Electronic Commerce Chapter 2 Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. 2-1.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
1 Web Developer Foundations: Using XHTML Chapter 12 E-Commerce Overview Modified by Linda Kenney November, 2006.
WIRELESS CONNECTIONS & E-COMMERCE. Presentation Credits “Introduction to Computers” by Peter Norton “Using Information Technology” by V. Rajaraman.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
1 E-Commerce Overview Prepared by Terry Morris Kappa Beta Delta Harper College 11/03/04.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
1 Chapter 11 Understanding Computers, 11 th Edition 11 E-Commerce TODAY AND TOMORROW 11 th Edition CHAPTER.
7/19: Internet & eCommerce How companies use the Internet –Collaboration (internal & external) –Communication (internal & external): , etc. –Gather.
Types of Electronic Infection
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
Index Definition E-commerce : is the buying and selling of goods and services on the Internet, especially the World Wide Web. E-commerce has many.
Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1 Copyright © Terry Felke-Morris.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Systems that support electronically executed business transactions.
Chapter 10 Electronic Commerce. E-commerce is the buying and selling of products and services electronically over the Internet.
The Internet, The Web, and Electronic Commerce Chapter 2.
Lecture 10 John Hurley, CS 120, WInter Class Evaluations 2.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.
Systems that support electronically executed business transactions.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
Ecommerce Application Development For Online Selling Via Web and Mobile Application Electronic commerce, commonly known as e-commerce, is a type of industry.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
INTRODUCTION E-COMMERCE.
Doing Business in the Online World
Web Development & Design Foundations with HTML5 8th Edition
Copyright (c) 2007Prentice-Hall. All rights reserved.
E-Commerce Security.
McGraw-Hill Technology Education
12 E-Commerce Overview.
Web Development & Design Foundations with HTML5
Web Development & Design Foundations with H T M L 5
Web Development & Design Foundations with H T M L 5
Electronic Payment Security Technologies
Presentation transcript:

Jozef Goetz, © Pearson Education Copyright (c) 2007Prentice-Hall. All rights reserved.

Jozef Goetz, 2013 Learning Outcomes  In this chapter, you will learn how to:  Define E-Commerce  Identify benefits and risks of E-Commerce  Describe E-Commerce business models  Describe E-Commerce Security and Encryption  Describe EDI (Electronic Data Interchange)  Describe trends and projections for E-Commerce  Describe issues related to E-Commerce  Describe order and payment processing  Describe E-Commerce solution options 2

Jozef Goetz, 2013 What is E-Commerce? The integration of communications, data management, and security technologies to allow individuals and organizations to exchange information related to the sale of goods and services. Major functions of E-Commerce include: ◦ the buying of goods, ◦ the selling of goods, and ◦ the performance of financial transactions on the Internet. 3

Jozef Goetz, 2013 E-Commerce Advantages for Businesses  Reduced Costs  Business stays 24 hours a day  Increased Customer Satisfaction  By , discussion forum, online chat  More Effective Data Management  Automation of credit card verification and authorization, update inventory level  Potentially Higher Sales  The store available 24 hours a day to everyone on the planet 4

Jozef Goetz, 2013 E-Commerce Advantages for Consumers  Convenience  No travel time, available discussion forum about products  Easier Comparison Shopping  No driving  Easily surf the Web and compare prices and value  Wider Selection of Goods  Surf not only one store 5

Jozef Goetz, 2013 E-Commerce Risks for Businesses  Need for a robust, reliable web site  If your Web site isn’t available  Fraudulent credit card  Fraudulent transactions  Order placed by vandals  Customer reluctance to purchase online  Offer some incentives such as free shipping and “no question asked” returns policy  Increased competition  b/c the overhead is lower than for a traditional brick and mortal store 6

Jozef Goetz, 2013 E-Commerce Risks for Consumers  Possible Security Issues  Whether the Web site has SSL (Secure Socket Layer) for encryption and security info  Is the database secure and have a backup  Possible Privacy Issues  Privacy policy available  What the site will do with the info received  Purchasing based on photos & descriptions  So can the Web site have a return policy to feel more confident about purchase  Possible difficulty with returns  Vs a traditional brick and mortal store 7

Jozef Goetz, 2013 E-Commerce Business Models  B2C – Business-to-Consumer  Amazon.com  B2B – Business-to-Business  Supply chain among vendors, partners and business customers  C2C – Consumer-to-Consumer  ebay.com founded in 1995  B2G – Business-to-Government  Section508.gov of the Rehabilitation Act requires the Web site used by federal agencies is available to people with disabilities 8

Jozef Goetz, 2013 Electronic Data Interchange (EDI) p.490  The transfer of data between different companies using networks.  Facilitates the exchange of standard business documents including purchase orders and invoices  ASC12 is chartered by ANSI to develop and maintain EDI standards  EDI is not new  In existence since the 1960s  Trading Partners  Organizations that exchange EDI transmissions  Newer technologies  XML and Web Services are replacing traditional EDI  Provide opportunities to customize secure information exchange over the Internet 9

Jozef Goetz, 2013 E-Commerce U.S. Retail Sales Top Four Categories – Billions of Dollars *projected

Jozef Goetz, 2013 Who’s On the Internet? Source: -Pages/Trend-Data/Whos- Online.aspx May Pages/Trend-Data/Whos- Online.aspx Other Demographics: ◦ w/ebusiness614.htm w/ebusiness614.htm ◦ ◦ ◦ m m 11 Category Percentage That Use the Internet Men78% Women76% Age: % Age: % Age: % Age: Over 6545% Household Income: Less than $30,00062% Household Income: $30,000 to $49,99984% Household Income: $50,000 to $74,99993% Household Income: $75,000 or higher95% Education: High school graduate72% Education: Some college94% Education: College graduate95% Mirrors the U.S. Population Male 49% Female 51% Household Income $40,816 Adults %

Jozef Goetz, 2013 E-Commerce Issues p.492  Intellectual Property  Security  Fraud  Taxation  State gov and local municipalities need sales tax to fund education, public safety, health, and many other services  International Commerce 12

Jozef Goetz, 2013 E-Commerce Security Encryption ◦ Ensures privacy within an organization and on the Internet. ◦ The conversion of data into an unreadable form, called a ciphertext. Decryption ◦ The process of converting the ciphertext back into its original form, called plaintext or cleartext, so it can be understood. The encryption/decryption process requires an algorithm and a key. 13

Jozef Goetz, 2013 E-Commerce Security Encryption Types Secure E-Commerce transactions use the encryption technologies below:  Symmetric-key Encryption  Asymmetric-key Encryption  Hash Encryption SSL (Secure Sockets Layer)  Utilizes these encryption technologies  Provides for secure transmission of data on the Internet. 14

Jozef Goetz, 2013 E-Commerce Security Types of Encryption(1) Symmetric-Key Encryption Also called single-key encryption Both encryption and decryption use the same key Both the sender and receiver must know the key before communicating using encryption. Advantage: speed 15

Jozef Goetz, 2013 E-Commerce Security Types of Encryption(2) p.494 Asymmetric-Key Encryption Also called public-key encryption There is no shared secret Two keys are created at the same time: ◦ Public key ◦ Private key ◦ They are mathematically related Asymmetric-key encryption is much slower than symmetric-key encryption. 16

Jozef Goetz, 2013 E-Commerce Security Types of Encryption(3) Hash Encryption  Used for information sent not altered  A hash algorithm transforms a string of characters into a key called “digest”  A shorter fixed-length value or key that represents the original string  One-way encryption  Purpose: verify the integrity of information 17

Jozef Goetz, 2013 Secure Sockets Layer (SSL)  A protocol that allows data to be privately exchanged over public networks  Developed by Netscape  Encrypts data sent between a client (usually a Web browser) and a Web server.  Utilizes both symmetric and asymmetric keys.  “ https ” protocol  Browsers display a “ lock ” icon 18

Jozef Goetz, 2013 SSL in Action

Jozef Goetz, 2013 Secure Sockets Layer (SSL)  SSL provides secure communication between a client and server by using:  Server and (optionally) client digital certificates for authentication  Symmetric-key cryptography using a "session key" for bulk encryption  Public-key cryptography for transfer of the session key  Message Digests (hash encryption) to verify the integrity of the transmission 20

Jozef Goetz, 2013 SSL & Digital Certificate Digital Certificate ◦ A form of an asymmetric key  Also contains information about  the certificate,  the holder of the certificate, and  the issuer of the certificate. ◦ Used by SSL to authenticate the identity of the Web server 21

Jozef Goetz, 2013 Digital Certificate The contents of a digital certificate include: ◦ The public key ◦ Effective date of the certificate ◦ Expiration date of the certificate Details about the Certificate Authority -- the issuer of the certificate ◦ Details about the certificate holder ◦ A digest of the certificate content 22

Jozef Goetz, 2013 Certificate Authority A trusted third-party organization or company that issued digital certificates. Well-known Certificate Authorities: ◦ Verisign  ◦ Thawte 

Jozef Goetz, 2013 Obtaining a Digital Certificate Request a certificate from a Certificate Authority and pay the application fee. The Certificate Authority: ◦ verifies your identity, ◦ issues your Certificate, ◦ and supplies you with a public/private key pair. Store the certificate in your software - such as a web server, web browser, or application. The Certificate Authority makes your certificate publicly known. 24

Jozef Goetz, 2013 SSL & Digital Certificates When you visit an e-commerce site that uses SSL, a number of steps are involved in the authentication process. ◦ The web browser and web server go through initial handshaking steps using the server certificate and keys. ◦ Once trust is established, the web browser encrypts the single secret key (symmetric key) that will be used for the rest of the communication. ◦ From this point on, all data is encrypted using the secret key. 25

Jozef Goetz, 2013 Checkpoint Describe three advantages of e-commerce for an entrepreneur just starting a business. 2.Describe three risks that businesses face when engaging in e-commerce. 3.Define SSL. Describe how an online shopper can tell that an e-commerce site is using SSL. 26

Jozef Goetz, 2013 Order & Payment Processing  E-Commerce Payment Models p.497-8:  Cash  Check  Credit  Smart Card  Mobile Payment 27

Jozef Goetz, 2013 Credit Card Order Processing Flow

Jozef Goetz, 2013 E-Commerce Storefront Solutions p.499 Instant Online Storefront ◦ Yahoo!, Earthstores, Shopify Off-The-Shelf Shopping Cart Software ◦ Agoracart, osCommerce, ZenCart, Mercantec Softcart Custom Built Solution from scratch ◦ Use software development tools: Visual Studio.NET, Adobe Dreamweaver,, DBMS, and server-side scripting ◦ A commerce server may be required: IBM's WebSphere Commerce Suite, Microsoft's Commerce Server Semi-Custom Built Solutions on a Budget  Pre-written  order processing scripts  shopping cart scripts  Paypal order processing  Google Checkout  E-Commerce add-ons for Dreamweaver 29

Jozef Goetz, 2013 Checkpoint List three payment models commonly used on the Web. Which one is the most popular, why? 2. Have you purchased online? If so, think of the last item that you purchased. 1.Why did you purchase it online instead of at a store? 2.Did you check to see if the transaction was secure? Why or why not? 3.How will your shopping habits be different in the future? Convenience, lower cost, and ease of shipping 30

Jozef Goetz, 2013 Summary This chapter introduced you to basic e-commerce concepts and implementations. Consider taking an E-Commerce course to continue your study of this dynamic and growing area of web development. 31