Saatchi, Seyed Mohsen1 Arab Open University - AOU T171 You, Your Computer and the Net: Learning and living in the information age Session 10.

Slides:



Advertisements
Similar presentations
Lecture 2 - Revenue Models
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Saatchi, Seyed Mohsen1 Arab Open University - AOU T171 You, Your Computer and the Net: Learning and living in the information age Session 9.
Internet Applications
How is the internet used? How can I satisfy customers?
The Digital Business is the present and the future
Cryptography and Network Security
7-1 Chapter 7 – Web Security Use your mentality Wake up to reality —From the song, "I've Got You under My Skin“ by Cole Porter.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Back to Table of Contents
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
10 1 WEB PORTALS AND ELECTRONIC COMMERCE Doing Business on the Internet New Perspectives on THE INTERNET.
Introduction E-Commerce is firmly established: –1997: $500M –2001: $50B Amazon.com: –First big online retailer –New business model: no brick-and-mortar.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Cryptography and Network Security Chapter 17
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 8 Web Security.
장홍예 Telecommunication Engineer Lab E-COMMERCE: TECHNICAL AND MARKET APPROACH.
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
SMALL BUSINESS MANAGEMENT Chapter 9 Small Business and Electronic Commerce.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
SD1230 Unit 8 The Mobile Landscape. Course Objectives During this unit, we will cover the following course objectives: – Identify the characteristics.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Retailing in Electronic Commerce: Products and Services
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Electronic Payment Systems
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
EFirm & eCommerce Digital Firm. Contents 1. Introduction 2. The opportunities of technology 3. Electronic Commerce 4. Payment systems 5. Management challenges.
Being Ecommerce Sophon Thanasrivilai #100485
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
E-Commerce. 2 What is E-commerce?  Electronic commerce (e-commerce) –A business transaction that occurs over a computer network. –Sometimes called e-business.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Marketing Management Online marketing
Chapter 6 E-Commerce. Agenda What is E-Commerce? Business to Business Business to Customer Business to employee Infrastructure Problems.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Module 3: Business Information Systems Chapter 8: Electronic and Mobile Commerce.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce. Buying and selling, and marketing and servicing of products and services, and information via computer networks.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Saatchi, Seyed Mohsen1 Arab Open University - AOU T171 You, Your Computer and the Net: Learning and living in the information age Session 11.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
CUSTOMER IDENTIFIES A NEEDS SEARCH FOR SERVICES OR PRODUCT TO SATISFY THE NEED SELECT A VENDOR & NEGOTIATE THE PRICE RECEIVES THE PRODUCT OR SERVICE MAKE.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
T171 P1( Prepared By: M.Hussein Y.Mansour) Copyright 2005© ITC 1.
T171 P1( Prepared By: M.Hussein Y.Mansour) Copyright 2005© ITC 1.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
Module 3 e-Business Model. e-Business Models Online Transaction Grid: is a way of classifying the transactions that take place on the internet The classification.
Arab Open University - AOU
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Cryptography and Network Security
Unit 8 Network Security.
Cryptography and Network Security
Presentation transcript:

Saatchi, Seyed Mohsen1 Arab Open University - AOU T171 You, Your Computer and the Net: Learning and living in the information age Session 10

Saatchi, Seyed Mohsen 2 About Module III Deconstruction Section 2: Deconstruction Book reference: Blown to Bits, Chapters 4

Saatchi, Seyed Mohsen3 Main Ideas covered in this section are: What is Deconstruction What is Deconstruction Techno-optimism and pessimism Techno-optimism and pessimism The impact of Internet on Traditional business The impact of Internet on Traditional business Online security Online security

Saatchi, Seyed Mohsen4 What is Deconstruction? It is the process of reformulation of tradition business structure in such a way that Internet would have the ability to affect a big business structure by destroying a small piece of it. Newspapers An example of a big business structure that can be affect by Deconstruction is the Newspapers.

Saatchi, Seyed Mohsen5 Techno-optimism and pessimism Techno-optimist Techno-optimist is the feeling that the Internet is going to have a major effect on all our lives and is going to drastically change the way we live and conduct business so that e-business will replace any other type of business. Techno-pessimist Techno-pessimist is just the opposite. It is the feeling that the Internet effect will be very minimal and might just provide another minor scene for established business.

Saatchi, Seyed Mohsen6 Impact of Internet on traditional business Internet could change traditional business in the following ways: 1- Shopping becomes more of a social experience (not only feeling of happiness in shopping) 2- Shops become more specialized (a certain shop provide highly specialized products) 3- Shops become more service oriented (consumers get more help in some questions they have)

Saatchi, Seyed Mohsen7 Impact of Internet on Traditional business 4- Shops use a hybrid approach (a mix between a physical presence and online presence) 5- Shops go online only (for some cases, shops may restrict its presence to online only)

Saatchi, Seyed Mohsen8 Online security Some limitations in the initial design of Internet are: Lack of Privacy Anonymity Encryption

Saatchi, Seyed Mohsen9 Lack of Privacy data-packets routed intermediate nodeview listenconversation Internet is not secure Since message exchange between two nodes in Internet are broken down into data-packets and routed through the network, it is possible for an intermediate node to view the packets and listen to the conversation. Thus, the Internet is not secure, based on its original design.

Saatchi, Seyed Mohsen10 Anonymity technical protocols authentication As long as you follow the technical protocols in the internet, your message will be routed regardless of your identity. So, in the original Internet design, there is no real authentication. online security To be able to have online security, additional protocols are added to run on top of the original protocols of the Internet. encryption A concept that is essential for security is the encryption

Saatchi, Seyed Mohsen11 Encryption encoding decryptdecode Is the process of encoding a message sent through some communication medium so that anyone listening to the message cannot understand its contents. Only the one who has a key to decrypt (decode) this message will be able to understand the message contents.

Saatchi, Seyed Mohsen12 Encryption The requirement for encryption to provide a good level of security are: encryption decrypt a) The encryption process should be complex enough to make the encoded message difficult for unauthorized users to decrypt (break the code) decrypt b) The Intended receiver should be able to decrypt that message back to it original format encryptiondecryption c) The keys used for encryption and decryption should themselves be secure.

Saatchi, Seyed Mohsen13 Type of encryption Symmetrical Symmetrical The key used for encryption the message is the same as the key used for decryption it. Asymmertical Asymmertical different The key used for encryption a message is different from the key used to decrypt the same message

Saatchi, Seyed Mohsen14 Provide security for e-business The are two main protocols over the Internet used to provide security for e-business The are two main protocols over the Internet used to provide security for e-business: SSL SSL – Secure Sockets Layer SET SET – The Secure Electronic Transaction

Saatchi, Seyed Mohsen15 SSL Secure Sockets Layer - SSL protocol de-facto This protocol was the first to be used and became the de-facto standard for e-business cryptography It utilize the public key cryptography behind the scenes to provide security information exchange between the customer and the merchant.

Saatchi, Seyed Mohsen16 SET The Secure Electronic Transaction - SET bankscredit This protocol is used by banks and credit card issuers authentication It allows for more authentication of the user of the credit card. This is done by introducing a third party who authenticates the identity of the customer digital certificate Each participant should get a digital certificate Due to its overhead, the SET protocol is not used widely over the Internet

Saatchi, Seyed Mohsen 17 About Module III Disintermediation Section 3: Disintermediation Book reference: Blown to Bits, Chapters 5

Saatchi, Seyed Mohsen18 About Section 3 A- Disintermediation B- Re-intermediation C- E-business models

Saatchi, Seyed Mohsen19 Disintermediation Disintermediation producer consumer Disintermediation is used to describe the possible threat of the Internet on business that used to work as intermediaries between the producer and the consumer. The advent of e-business allowed the consumer and producer to have a direct connection between them which minimizes the role of traditional intermediaries (agent). richnessreach richness of information However, intermediaries still have a role in the trade- off between richness and reach in such a way that they can provide advice (richness of information) to a potential customer

Saatchi, Seyed Mohsen20 Example on disintermediation Online Banking Online Banking: Many banks offer online banking services which allow the customer to perform many operations on his account by himself through the internet. Online PC Producers Online PC Producers: like Dell computer company which make most of its selling directly to customers via the Internet. As a result, customer can go directly to Dells website and construct the specifications of the computer he wants and then purchases it through the web.

Saatchi, Seyed Mohsen21 Re-intermediation intermediaries intermediariesRe- intermediation Even though the Internet has eliminated the need for some type of intermediaries, it has introduced the need for new types of intermediaries. This is what is known as Re- intermediation.

Saatchi, Seyed Mohsen22 Types of intermediaries Some of these types of intermediaries and the reasons behind their introduction are: A- Search engines and web directories B- Review or link site C- Portal sites D- Intelligent agents E- Business models

Saatchi, Seyed Mohsen23 Search engines and web directories search engines A search engines is an intermediary website that allows the user to enter some information and then the website will in turn provide the user with a list of websites that contain relevant information based on what the user has entered. web directory A web directory is a way of listing many services in a well organized manner that allows the user to get the service needed in a very short time.

Saatchi, Seyed Mohsen24 Review or link site Many sites provide a large collection of products for selling in such a way that the consumer might be confused and dont know what brand to buy. The website will also provide you with link to places you can buy from. Examplewww.cnet.com An Example of such website is: which offers reviews and links on many electronic and computer products.

Saatchi, Seyed Mohsen25 Portal Site Portal sites Portal sites are major sites that are frequently visited and act as a gateway to the internet like AOL, MSN and yahoo. Because portals are visited by many people, they often work as intermediaries between those people and other websites.

Saatchi, Seyed Mohsen26 Intelligent agents In the process of intelligent agents, computers are needed to behave in a relatively intelligent way to perform a certain task online. Some example of categories that these agents could help in are: Product Brokering Product Brokering: This agent enables you to know about sales of a certain product and other types of similar products available. Merchant Brokering Merchant Brokering: this agent look although the net for comparing prices of a certain product and then list back to you the best prices. Negotiator Negotiator: this agent negotiates with a certain merchant on your behalf and will communicate with many producers (computers) and report back to you about the results.

Saatchi, Seyed Mohsen27 E-Business models Some of the ways of making money on the web for such websites include Some of the ways of making money on the web for such websites include: Advertising Advertising: Sites that are visited frequently (portals) can make a lot of revenue by providing the possibility to other business to advertise on its website( Ex: Ads on site) Affiliation Affiliation: Some intermediary sites might link the customer to a seller who is affiliated with that site. Similarly, search engines might list the websites you ask for (based on a certain search) in a biased way in the sense that they would put sites they affiliated with at the top of the list.

Saatchi, Seyed Mohsen28 E-Business models Subscription Subscription: some sites ask for a subscription fee form the customer if he wants to use the services provided by that site or might give some services for free and ask for a fee for additional services. For example For example, hotmail gives anybody an account for free but asks for some fee to expand the size of your storage.

Saatchi, Seyed Mohsen29 E-business model Selling information Selling information: some smaller websites sell information about people who visited their website to any one interested in getting this information. (like personal s that can be used by other companies to contact you and try to sell you some product).