SlideShare a Scribd company logo
1 of 13
Download to read offline
Pertemuan 7Sistem Keamanan dalam e-Bisnis 
1
Learning Outcomes 
Pada akhir pertemuan ini, diharapkan mahasiswa 
akan mampu : 
•Menjelaskan sistem keamanan dalam e-bisnis 
2
Outline Materi 
•PengamananInternet 
•PenjualandiWeb 
•Multimedia delivery 
3
Internet Network Architecture 
4 
NAP 
NAPNAP 
NAPISPISP 
ISP 
ISP 
ISPISPISP 
ISPISPISP 
Backbone 
© Prentice Hall, 2000
Internet Security 
•Authenticity 
–the sender (either client or server) of a message is who he, she or it claims to be 
•Privacy 
–the contents of a message are secret and only known to the sender and receiver 
•Integrity 
–the contents of a message are not modified (intentionally or accidentally) during transmission 
•Non-repudiation 
–the sender of a message cannot deny that he, she or it actually sent the message 
5
6MessageTextCipheredText 
Message 
Text 
Sender 
Receiver 
EncryptionDecryption 
Private Key 
Private Key 
•Private Key Encryption (Symmetrical Key Encryption) 
•Data Encryption Standard (DES)is the most widely used symmetrical encryption algorithm 
Encryption
7 
Message 
TextCipheredTextMessageText 
Sender 
ReceiverEncryption 
Decryption 
Public Key of 
Recipient 
Private Key of 
Recipient 
–Public Key Encryption (Asymmetrical Key Encryption) 
Encryption(cont.)
–Digital Envelope —combination of symmetrical and public key encryption 
8MessageText 
Ciphered 
TextMessageText 
Sender 
ReceiverEncryption 
Decryption 
Session KeySession Key 
Public key of 
Recipient 
Public key of 
Recipient 
Session Key 
Session KeyDigital EnvelopEncryption(cont.)
9MessageText 
Message 
TextSender 
Receiver 
EncryptionDecryption 
Public Key of 
Recipient 
Private Key ofRecipient 
–Digital Signatures : Authenticity and Non-Denial 
Signature 
Signature 
Private Key of Sender 
Public Key of SenderCipheredTextEncryption(cont.)
Penjualan di Web 
•Function Requirements for an Electronic Storefront 
–Search for, discover, and compare products for purchase 
–Select a product to be purchased and negotiate or determine its total price 
–Place an order for desired products 
–Have their order confirmed, ensuring that the desired product is available 
–Pay for the ordered products (usually through some form of credit) 
–Verify their credit and approve their purchase 
–Have orders processed 
–Verify that the product has been shipped 
–Request post-sales support or provide feedback to the seller 
10
Penjualan di Web 
•Electronic storefront must contain: 
–A merchant system or storefront that provides the merchant’s catalog with products, prices and promotions 
–A transaction system for processing orders and payments and other aspects of the transaction 
–A payment gateway that routes payments through existing financial systems primarily for the purpose of credit card authorization and settlement 
11
Multimedia Delivery 
•Webcasting—describes Internet-based broadcasting of audio and video content 
–Types of Webcasts 
•Text Streams—Text-only wordcasts and datacasts 
–to deliver constant news and stock price updates 
•Ambient Webcasts—Video content 
–is captured from a Webcam and delivered as single-frame updates that are transmitted at periodic intervals 
•Streaming Audio—Web equivalent of radio 
–to deliver everything from talk radio to sports broadcasts to music previews to archived music and radio shows 
•Streaming Video 
–to deliver videoconferences where high quality images are not required and there is not much movement among participants 
12
•Works in a straightforward way 
•Examples of companies offering both Webcast servers and players 
–RealNetworks ( www.real.com) 
–Liquid Audio ( www.liquidaudio.com) 
–Xingtech with its streamworks technology ( www.xingtech.com) 
–Apple with its QuickTime system ( quicktime.apple.com) 
–Microsoft with its Netshow software (www.microsoft.com/windows/windowsmedia) 
•Multicasting 
–stream a Webcast from a central server to other media servers which are distributed to different locations 
–when a listener or viewer clicks on a Webcast link they are automatically routed to the closest server 
13 
Webcasting

More Related Content

Similar to Keamanan e bisnis

Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce STS
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Network security-primer-9544
Network security-primer-9544Network security-primer-9544
Network security-primer-9544Hfz Mushtaq
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transactionNishant Pahad
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, OracleIssues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oraclemfrancis
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Designjonmccoy
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process CommunicationAbhishek Sagar
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate wayvfmindia
 
Best Practices, AWS Elemental and Media Services
Best Practices, AWS Elemental and Media ServicesBest Practices, AWS Elemental and Media Services
Best Practices, AWS Elemental and Media ServicesCloudHesive
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxSmithaV19
 
Azure mediaservices
Azure mediaservicesAzure mediaservices
Azure mediaservicessharan gowde
 
Build end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media ServicesBuild end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media ServicesKen Cenerelli
 
Sm west 2010-microsoft-workshop
Sm west 2010-microsoft-workshopSm west 2010-microsoft-workshop
Sm west 2010-microsoft-workshopPrashant Ohal
 

Similar to Keamanan e bisnis (20)

Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Chapter08
Chapter08Chapter08
Chapter08
 
Web security
Web securityWeb security
Web security
 
Network security-primer-9544
Network security-primer-9544Network security-primer-9544
Network security-primer-9544
 
Secure electronic transaction
Secure electronic transactionSecure electronic transaction
Secure electronic transaction
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Web technology
Web technologyWeb technology
Web technology
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, OracleIssues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
Issues in Designing Push Based Mobile Application Platform - Rafiul Ahad, Oracle
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
Linux Inter Process Communication
Linux Inter Process CommunicationLinux Inter Process Communication
Linux Inter Process Communication
 
Secure email gate way
Secure email gate waySecure email gate way
Secure email gate way
 
Best Practices, AWS Elemental and Media Services
Best Practices, AWS Elemental and Media ServicesBest Practices, AWS Elemental and Media Services
Best Practices, AWS Elemental and Media Services
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
1-1.pdf
1-1.pdf1-1.pdf
1-1.pdf
 
Azure mediaservices
Azure mediaservicesAzure mediaservices
Azure mediaservices
 
Build end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media ServicesBuild end-to-end video experiences with Azure Media Services
Build end-to-end video experiences with Azure Media Services
 
Sm west 2010-microsoft-workshop
Sm west 2010-microsoft-workshopSm west 2010-microsoft-workshop
Sm west 2010-microsoft-workshop
 

More from likut101010

Basis data relasional
Basis data relasionalBasis data relasional
Basis data relasionallikut101010
 
Model relational
Model relationalModel relational
Model relationallikut101010
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)likut101010
 
Kriptografi modern
Kriptografi modernKriptografi modern
Kriptografi modernlikut101010
 
System informasi basis data
System informasi basis dataSystem informasi basis data
System informasi basis datalikut101010
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari harilikut101010
 
Kriptografi klasik
Kriptografi klasikKriptografi klasik
Kriptografi klasiklikut101010
 
Kriptografi jawa
Kriptografi jawaKriptografi jawa
Kriptografi jawalikut101010
 
World wide web security
World wide web securityWorld wide web security
World wide web securitylikut101010
 
Digital signature
Digital signatureDigital signature
Digital signaturelikut101010
 
keamanan sistem operasi
keamanan sistem operasikeamanan sistem operasi
keamanan sistem operasilikut101010
 
Keamanan komputer
Keamanan komputerKeamanan komputer
Keamanan komputerlikut101010
 
Protokol keamanan
Protokol keamananProtokol keamanan
Protokol keamananlikut101010
 

More from likut101010 (17)

Basis data relasional
Basis data relasionalBasis data relasional
Basis data relasional
 
Model relational
Model relationalModel relational
Model relational
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Kriptografi modern
Kriptografi modernKriptografi modern
Kriptografi modern
 
System informasi basis data
System informasi basis dataSystem informasi basis data
System informasi basis data
 
Kriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hariKriptografi dalam kehidupan sehari hari
Kriptografi dalam kehidupan sehari hari
 
Kriptografi klasik
Kriptografi klasikKriptografi klasik
Kriptografi klasik
 
Kriptografi jawa
Kriptografi jawaKriptografi jawa
Kriptografi jawa
 
Kriptografi
KriptografiKriptografi
Kriptografi
 
World wide web security
World wide web securityWorld wide web security
World wide web security
 
Fungsi hash
Fungsi hashFungsi hash
Fungsi hash
 
Digital signature
Digital signatureDigital signature
Digital signature
 
keamanan sistem operasi
keamanan sistem operasikeamanan sistem operasi
keamanan sistem operasi
 
Keamanan komputer
Keamanan komputerKeamanan komputer
Keamanan komputer
 
Protokol keamanan
Protokol keamananProtokol keamanan
Protokol keamanan
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Firewall
FirewallFirewall
Firewall
 

Recently uploaded

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Keamanan e bisnis

  • 1. Pertemuan 7Sistem Keamanan dalam e-Bisnis 1
  • 2. Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : •Menjelaskan sistem keamanan dalam e-bisnis 2
  • 3. Outline Materi •PengamananInternet •PenjualandiWeb •Multimedia delivery 3
  • 4. Internet Network Architecture 4 NAP NAPNAP NAPISPISP ISP ISP ISPISPISP ISPISPISP Backbone © Prentice Hall, 2000
  • 5. Internet Security •Authenticity –the sender (either client or server) of a message is who he, she or it claims to be •Privacy –the contents of a message are secret and only known to the sender and receiver •Integrity –the contents of a message are not modified (intentionally or accidentally) during transmission •Non-repudiation –the sender of a message cannot deny that he, she or it actually sent the message 5
  • 6. 6MessageTextCipheredText Message Text Sender Receiver EncryptionDecryption Private Key Private Key •Private Key Encryption (Symmetrical Key Encryption) •Data Encryption Standard (DES)is the most widely used symmetrical encryption algorithm Encryption
  • 7. 7 Message TextCipheredTextMessageText Sender ReceiverEncryption Decryption Public Key of Recipient Private Key of Recipient –Public Key Encryption (Asymmetrical Key Encryption) Encryption(cont.)
  • 8. –Digital Envelope —combination of symmetrical and public key encryption 8MessageText Ciphered TextMessageText Sender ReceiverEncryption Decryption Session KeySession Key Public key of Recipient Public key of Recipient Session Key Session KeyDigital EnvelopEncryption(cont.)
  • 9. 9MessageText Message TextSender Receiver EncryptionDecryption Public Key of Recipient Private Key ofRecipient –Digital Signatures : Authenticity and Non-Denial Signature Signature Private Key of Sender Public Key of SenderCipheredTextEncryption(cont.)
  • 10. Penjualan di Web •Function Requirements for an Electronic Storefront –Search for, discover, and compare products for purchase –Select a product to be purchased and negotiate or determine its total price –Place an order for desired products –Have their order confirmed, ensuring that the desired product is available –Pay for the ordered products (usually through some form of credit) –Verify their credit and approve their purchase –Have orders processed –Verify that the product has been shipped –Request post-sales support or provide feedback to the seller 10
  • 11. Penjualan di Web •Electronic storefront must contain: –A merchant system or storefront that provides the merchant’s catalog with products, prices and promotions –A transaction system for processing orders and payments and other aspects of the transaction –A payment gateway that routes payments through existing financial systems primarily for the purpose of credit card authorization and settlement 11
  • 12. Multimedia Delivery •Webcasting—describes Internet-based broadcasting of audio and video content –Types of Webcasts •Text Streams—Text-only wordcasts and datacasts –to deliver constant news and stock price updates •Ambient Webcasts—Video content –is captured from a Webcam and delivered as single-frame updates that are transmitted at periodic intervals •Streaming Audio—Web equivalent of radio –to deliver everything from talk radio to sports broadcasts to music previews to archived music and radio shows •Streaming Video –to deliver videoconferences where high quality images are not required and there is not much movement among participants 12
  • 13. •Works in a straightforward way •Examples of companies offering both Webcast servers and players –RealNetworks ( www.real.com) –Liquid Audio ( www.liquidaudio.com) –Xingtech with its streamworks technology ( www.xingtech.com) –Apple with its QuickTime system ( quicktime.apple.com) –Microsoft with its Netshow software (www.microsoft.com/windows/windowsmedia) •Multicasting –stream a Webcast from a central server to other media servers which are distributed to different locations –when a listener or viewer clicks on a Webcast link they are automatically routed to the closest server 13 Webcasting