Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.

Slides:



Advertisements
Similar presentations
Customer Interface. Agenda  What are the seven design elements of the customer interface?  What determines the look-and-feel of the site?  What are.
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Antarmuka Pemakai (User Interface)
Chapter 5. Seven Design Elements of Customer Interface Context  Functional look and feel  How it is presented Content  What is presented Community.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
“Electronic Payment System”
Conceptual Design of an E- commerce System Min Ding Smeal College of Business Administration Pennsylvania State University.
E-Commerce Michael Andrianus – Vincentius
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
Ecommerce Applications 2007/8 Session 61 E-commerce Applications Process views.
Being Ecommerce Sophon Thanasrivilai #100485
Internet Security for Small & Medium Business Week 6
COMP 6125 An Introduction to Electronic Commerce Session 4: E-Commerce In Developing Countries.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
1 Capability Set - Detail. 2 Common Online Problems Desire to generate additional revenue –Must allow for guest deposits to student accounts –Need way.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Jeopardy Computer Internet Policy & Legal Potpourri Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
5 Customer Interface chapter McGraw-Hill/Irwin
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Dimensions of E – Commerce Security
ELECTRONIC COMMERCE, STRATEGY & MANAGEMENT (COM350)
Client/User Analysis Website Design. 2 Questions to be answered: What is the purpose of the site? What is the purpose of the site? Who is the site for?
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
Payment Systems Unit 34: E-commerce M2 - Compare two different payment systems used in e-commerce systems.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
E-Commerce & M-Commerce. Introduction Electronic commerce, commonly known as e- commerce, It is a type of industry where buying and selling of product.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
E-Commerce & Bank Security By: Mark Reed COSC 480.
1 E-cash Model Ecash Bank Client Wallet Merchant Software stores coins makes payments accepts payments Goods, Receipt Pay coins sells items accepts payments.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 5 Electronic Commerce | Security
Module 4: Strategy Formulation: Customer Interface
What is Commerce According to Dictionary.com
Chapter 5 Electronic Commerce | Security
Lecture 8 Customer Interface.
Presentation transcript:

Customer Interface for wuw.com 1.Context

Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3. Community The website offers by community functions in the form of message boards to form a huge community of actors, producers. It can be concluded that our website’s community classification is “strong ”.

Customer Interface for wuw.com 4. Customization Our website can provide limited customizable content and context which includes layout configuration and storage. Its customization type is tailoring, because mainly there is a general concept. By this reason, the website is moderately customized. 5. Communication Our website send personalized messages and registered users can respond by submitting information through live interaction. Broadcast communication (one-way) Interactive communication (two-way)

Customer Interface for wuw.com 6. Connection In our website some links are related to links provided gifts pictures. Some of the links are in the form of framed links and outsourced content are used on the website. 7. Commerce Our website will be equipped several commerce features such as Security, Credit Card approval, Delivery options, Registration, Order tracking. So our website has high level commerce’s ability.

Map of 7Cs framework

Security Issues for wuw.com In the use of electronic commerce process, the safety factors involved in the following six areas: The Integrity of the Information The Validity of Information The Non-repudiation of Information The Authenticity of the Transaction Status The Reliability of the System

The Threats to E-Commerce User and system administrator awareness is becoming more important in the effort to counter e-commerce attacks. E- commerce security needs to be addressed not only at the business site with its servers/network but also on the client side, which includes direct connected home computers. Service-Side Systems An organization’s infrastructure for supporting an e- Commerce service will typically have two main elements including Front - end (generally one or more web servers connected to the Internet), Back - end systems needed both to supply information to the front-end systems

The Threats to Front-end Systems

The Threats to Back-end Systems

Transaction Issues Transactions between buyers and sellers can include requests for information, quotation of prices, placement of orders and payment, and after sales services.

Client-Side Issues Some of the main threats resulting from lack of control of the client-side are shown in following table.

Privacy Issues Consumers are primarily concerned with about four privacy issues: When one’s information will be used, by whom and for what purposes. Choices about whether or not to volunteer one’s personal information. Ability to access one’s information to perform corrections and /or updates. Protection of their information form third parties who may steal it for unauthorized purposes.

Privacy Policy of wuw.com All members of our website can control the information published on their accounts. Therefore, members are responsible for their own privacy and dissemination of information. Any contact information which our site collects will not be passed on to any other companies or third parties. web-site can use the information for the purpose of contacting members regarding their membership, and may from time to time include in-house promotional items and campaigns.

Security Solutions for wuw.com The main tool our company uses to protect their internal network is the firewall. Current internet technology has an in-built mechanism, known as Secure Sockets Layer (SSL) that can be used to encrypt messages sent between web browsers and web servers in our website. Credit card details supplied by the customer, either to the merchant or payment gateway. Handled by the server's SSL and the merchant/server's digital certificates. Credit card details passed to the bank for processing. Handled by the complex security measures of the payment gateway.

Payment Security and Public Policy Our payment security software offers a suite of solutions that support merchants, financial institutions, and information processors in achieving compliance with the PCI standard. Our Copyright policy is including that all data, text, graphics, photographs, images and other material is must not be copied or reproduced without prior permission of web site. Our cancellation policy is explained that accounts can be cancelled at anytime, by request of members. Members’ account that are not adhering to the terms and conditions of membership and use policy will be cancelled.