SlideShare a Scribd company logo
Copyright © Terry Felke-Morris http://terrymorris.net
Web Development & Design
Foundations with HTML5
8th
Edition
CHAPTER 12
KEY CONCEPTS
1
Copyright © Terry Felke-Morris
Copyright © Terry Felke-Morris http://terrymorris.net
Learning Outcomes
In this chapter, you will learn how to
◦define e-commerce
◦identify benefits and risks of e-commerce
◦describe e-commerce business models
◦describe e-commerce security and encryption
◦define Electronic Data Interchange (EDI)
◦describe trends and projections for e-commerce
◦describe issues related to e-commerce
◦describe options for order and payment processing
2
Copyright © Terry Felke-Morris http://terrymorris.net
What is E-Commerce?
The integration of communications, data
management, and security technologies to
allow individuals and organizations to
exchange information related to the sale of
goods and services.
Major functions of E-Commerce include:
◦ the buying of goods,
◦ the selling of goods, and
◦ performance of financial transactions on the
Internet.
3
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Advantages for
Businesses
•Reduced Costs
•Increased Customer Satisfaction
•More Effective Data Management
•Potentially Higher Sales
4
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Advantages for
Consumers
•Convenience
•Easier Comparison Shopping
•Wider Selection of Goods
5
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Risks for
Businesses
•Need for a robust, reliable web site
•Fraudulent transactions
•Customer reluctance to purchase online
•Increased competition
6
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Risks for
Consumers
•Possible Security Issues
•Possible Privacy Issues
•Purchasing from photos & descriptions
•Possible difficulty with returns
7
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce
Business Models
•B2C – Business-to-Consumer
•B2B – Business-to-Business
•C2C – Consumer-to-Consumer
•B2G – Business-to-Government
8
Copyright © Terry Felke-Morris http://terrymorris.net
Electronic Data Interchange
(EDI)
The transfer of data between different companies using networks.
◦Facilitates the exchange of standard business documents including purchase
orders and invoices
EDI is not new -- In existence since the 1960s
Trading Partners
◦Organizations that exchange EDI transmissions
Newer technologies
◦XML and Web Services are replacing traditional EDI
◦Provide opportunities to customize secure information exchange
over the Internet
9
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce U.S. Retail
Sales
10
What do people buy online?
1. Clothing, accessories, and footwear ($40 billion)
2. Electronics and appliances ($22.75 billion)
3. Furniture and home furnishings ($20 billion)
4. Drugs, health aids, and beauty aids ($17 billion)
5. Computer hardware ($14.7 billion)
6. Music and videos ($10.25 billion)
7. Books and magazines ($10.2 billion)
8. Sporting goods ($7.8 billion)
9. Computer software ($5.41 billion)
10. Food, beer, and wine ($5.15 billion)
2013 Sales Figures
http://www2.census.gov/retail/releases/current/arts/ecommerce4541.xls
Copyright © Terry Felke-Morris http://terrymorris.net
Who’s On
the Internet?
 Source: http://www.pewinternet.org/data-trend/internet-use/latest-stats/
 Other Demographics:
◦ http://www.pewinternet.org/
◦ http://www.clickz.com
◦ http://www.census.gov/eos/www/ebusiness614.htm
11
Category Percentage That
Use the Internet
Men 87%
Women 86%
Age: 18-29 97%
Age: 30-49 93%
Age: 50-64 88%
Age: Over 65 57%
Household Income: Less than $30,000 77%
Household Income: $30,000 to $49,999 85%
Household Income: $50,000 to $74,999 93%
Household Income: $75,000 or higher 99%
Education: High school graduate 77%
Education: Some college 91%
Education: College graduate 97%
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Issues
•Intellectual Property
•Security
•Fraud
•Taxation
•International Commerce
12
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Security
Encryption
◦ Ensures privacy within an organization and on the Internet.
◦ The conversion of data into an unreadable form, called a
ciphertext.
Decryption
◦ The process of converting the ciphertext back into its original
form, called plaintext or cleartext, so it can be understood.
The encryption/decryption process requires an
algorithm and a key.
13
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Security
Encryption Types
Secure E-Commerce transactions use the
encryption technologies below:
◦Symmetric-key Encryption
◦Asymmetric-key Encryption
◦Hash Encryption
SSL (Secure Sockets Layer)
◦Utilizes these encryption technologies
◦Provides for secure transmission of data on the
Internet.
14
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Security: Symmetric-
Key
Symmetric-Key Encryption
Also called single-key encryption
Both encryption and decryption
use the same key
Both the sender and receiver must
know the key before
communicating using encryption.
Advantage: speed
15
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Security:
Asymmetric-key
Asymmetric-Key Encryption
Also called public-key encryption
There is no shared secret
Two keys are
created at the same time:
◦ Public key
◦ Private key
◦ Asymmetric-key encryption
is much slower than
symmetric-key encryption.
16
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Security: Hash
Hash Encryption
A hash algorithm transforms a string of characters into a
“digest”
◦A shorter fixed-length value or key that represents the original
string
One-way encryption
Used for information that will not be read or decrypted
Purpose: verify the integrity of information
17
Copyright © Terry Felke-Morris http://terrymorris.net
Secure Sockets Layer
(SSL)
•A protocol that allows data to be privately exchanged over
public networks
•Developed by Netscape
•Encrypts data sent between a client (usually a Web browser) and
a Web server.
•Utilizes both symmetric and asymmetric keys.
•“https” protocol
•Browsers display a “lock” icon 18
Copyright © Terry Felke-Morris http://terrymorris.net
Secure Sockets Layer
(SSL)
SSL provides secure communication between a client
and server by using:
◦Server and (optionally) client digital certificates for
authentication
◦Symmetric-key cryptography using a "session key" for bulk
encryption
◦Public-key cryptography for transfer of the session key
◦Message Digests (hash encryption) to verify the integrity of the
transmission
19
Copyright © Terry Felke-Morris http://terrymorris.net
SSL & Digital Certificate
Digital Certificate
◦ A form of an asymmetric key
 Also contains information about the certificate, the
holder of the certificate, and the issuer of the certificate.
◦ Used by SSL to authenticate the
identity of the web server
20
Copyright © Terry Felke-Morris http://terrymorris.net
Digital Certificate
The contents of a digital
certificate include:
◦ The public key
◦ Effective date of the certificate
◦ Expiration date of the certificate
◦ Details about the Certificate
Authority -- the issuer of the
certificate
◦ Details about the certificate
holder
◦ A digest of the certificate content
21
Copyright © Terry Felke-Morris http://terrymorris.net
Certificate Authority
A trusted third-party organization or company
that issued digital certificates.
Well-known Certificate Authorities:
Verisign
http://www.verisign.com
Thawte
http://www.thawte.com
22
Copyright © Terry Felke-Morris http://terrymorris.net
Checkpoint
1. Describe three advantages of e-commerce
for an entrepreneur just starting a business.
2. Describe three risks that businesses face
when engaging in e-commerce.
3. Define SSL. Describe how an online
shopper can tell that an e-commerce site is
using SSL.
23
Copyright © Terry Felke-Morris http://terrymorris.net
Order & Payment
Processing
E-Commerce Payment Methods:
◦Credit Card
◦Stored-value Card
◦Smart Card
◦Digital Cash
24
Copyright © Terry Felke-Morris http://terrymorris.net
E-Commerce Storefront
Solutions
Instant Online Storefront
◦ Shopify, BigCommerce
Off-The-Shelf Shopping Cart Software
◦ Agoracart, osCommerce, ZenCart
Custom Built Solution
◦ IBM's WebSphere Commerce Suite, Microsoft's Commerce
Server
◦ Microsoft Visual Studio, Adobe Dreamweaver
Semi-Custom Built Solutions on a Budget
 Paypal order processing
 Free shopping cart scripts
25
Copyright © Terry Felke-Morris http://terrymorris.net
Checkpoint
1. List three payment methods commonly used on the Web.
2. Have you purchased online? If so, think of the last item that
you purchased.
a. Why did you purchase it online instead of at a store?
b. Did you check to see if the transaction was secure? Why or why
not?
c. How will your shopping habits be different in the future?
3. Describe three types of e-commerce solutions available.
Which provides the easiest entry to e-commerce? Explain.
26
Copyright © Terry Felke-Morris http://terrymorris.net
Summary
This chapter introduced you to basic e-
commerce concepts and implementations.
Consider taking an E-Commerce course in the
future to continue your study of this dynamic
and growing area of web development.
27

More Related Content

What's hot

Chapter9
Chapter9Chapter9
Chapter9
DeAnna Gossett
 
Chapter3
Chapter3Chapter3
Chapter3
DeAnna Gossett
 
Chapter6
Chapter6Chapter6
Chapter6
DeAnna Gossett
 
Chapter4
Chapter4Chapter4
Chapter4
DeAnna Gossett
 
Chapter8
Chapter8Chapter8
Chapter8
DeAnna Gossett
 
Chapter 1 - Web Design
Chapter 1 - Web DesignChapter 1 - Web Design
Chapter 1 - Web Design
tclanton4
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
Zeeshan Alam
 
BSAD 104 Navigating The Internet
BSAD 104 Navigating The InternetBSAD 104 Navigating The Internet
BSAD 104 Navigating The Internet
msdenee
 
Chapter 11 - Web Design
Chapter 11 - Web DesignChapter 11 - Web Design
Chapter 11 - Web Design
tclanton4
 
HTML5--The 30,000' View (A fast-paced overview of HTML5)
HTML5--The 30,000' View (A fast-paced overview of HTML5)HTML5--The 30,000' View (A fast-paced overview of HTML5)
HTML5--The 30,000' View (A fast-paced overview of HTML5)
Peter Lubbers
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
Siva Rushi
 
Web Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and ServiceWeb Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and Service
kilmeny21
 
The Open Web
The Open WebThe Open Web
The Open Web
Lachlan Hardy
 
Web publishing
Web publishingWeb publishing
Web publishing
Kanav Sood
 
What the heck is HTML 5?
What the heck is HTML 5?What the heck is HTML 5?
What the heck is HTML 5?
Simon Willison
 
Chapter 4 - Web Design
Chapter 4 - Web DesignChapter 4 - Web Design
Chapter 4 - Web Design
tclanton4
 
A Brief History of Web publishing (from HTML to WordPress)
A Brief History of Web publishing (from HTML to WordPress)A Brief History of Web publishing (from HTML to WordPress)
A Brief History of Web publishing (from HTML to WordPress)
Brian Duffy
 
Tips on Creating Web Content
Tips on Creating Web ContentTips on Creating Web Content
Tips on Creating Web Content
senejug
 

What's hot (18)

Chapter9
Chapter9Chapter9
Chapter9
 
Chapter3
Chapter3Chapter3
Chapter3
 
Chapter6
Chapter6Chapter6
Chapter6
 
Chapter4
Chapter4Chapter4
Chapter4
 
Chapter8
Chapter8Chapter8
Chapter8
 
Chapter 1 - Web Design
Chapter 1 - Web DesignChapter 1 - Web Design
Chapter 1 - Web Design
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
BSAD 104 Navigating The Internet
BSAD 104 Navigating The InternetBSAD 104 Navigating The Internet
BSAD 104 Navigating The Internet
 
Chapter 11 - Web Design
Chapter 11 - Web DesignChapter 11 - Web Design
Chapter 11 - Web Design
 
HTML5--The 30,000' View (A fast-paced overview of HTML5)
HTML5--The 30,000' View (A fast-paced overview of HTML5)HTML5--The 30,000' View (A fast-paced overview of HTML5)
HTML5--The 30,000' View (A fast-paced overview of HTML5)
 
Introduction to HTML
Introduction to HTMLIntroduction to HTML
Introduction to HTML
 
Web Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and ServiceWeb Publishing: An Overview of Tools and Service
Web Publishing: An Overview of Tools and Service
 
The Open Web
The Open WebThe Open Web
The Open Web
 
Web publishing
Web publishingWeb publishing
Web publishing
 
What the heck is HTML 5?
What the heck is HTML 5?What the heck is HTML 5?
What the heck is HTML 5?
 
Chapter 4 - Web Design
Chapter 4 - Web DesignChapter 4 - Web Design
Chapter 4 - Web Design
 
A Brief History of Web publishing (from HTML to WordPress)
A Brief History of Web publishing (from HTML to WordPress)A Brief History of Web publishing (from HTML to WordPress)
A Brief History of Web publishing (from HTML to WordPress)
 
Tips on Creating Web Content
Tips on Creating Web ContentTips on Creating Web Content
Tips on Creating Web Content
 

Similar to Chapter12

Chapter 12 - Web Design
Chapter 12 - Web DesignChapter 12 - Web Design
Chapter 12 - Web Design
tclanton4
 
Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5
AssocProfMBAVelTechC
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
MyCase Legal Case and Practice Management Software
 
E Com
E ComE Com
EARN DAILY Eldorado Token
 EARN DAILY Eldorado  Token EARN DAILY Eldorado  Token
EARN DAILY Eldorado Token
SNEH LATA
 
E Commerce
E CommerceE Commerce
E Commerce
jroloff
 
Top blockchain platforms for digital marketing
Top blockchain platforms for digital marketingTop blockchain platforms for digital marketing
Top blockchain platforms for digital marketing
Global Tech Council
 
e-commerce and it's advantages and non benifit
e-commerce and it's advantages and non benifite-commerce and it's advantages and non benifit
e-commerce and it's advantages and non benifit
CHRISTINAGAYENMONDAL1
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
OliviaJune1
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
Host It Smart
 
Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)
Milan Hazra
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
itnewsafrica
 
Introduction to E-Commerce.pdf
Introduction to E-Commerce.pdfIntroduction to E-Commerce.pdf
Introduction to E-Commerce.pdf
KushBhushanwar1
 
E commerce and the mnc
E commerce and the mncE commerce and the mnc
E commerce and the mnc
03374
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
webhostingguy
 
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Bruno Segers
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
IMRAN KHAN
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
TanayMalhotra
 
The Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerceThe Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerce
Fito Benitez
 

Similar to Chapter12 (20)

Chapter 12 - Web Design
Chapter 12 - Web DesignChapter 12 - Web Design
Chapter 12 - Web Design
 
Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5Digital marketing ppt -e -Commerce unit -5
Digital marketing ppt -e -Commerce unit -5
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
E Com
E ComE Com
E Com
 
EARN DAILY Eldorado Token
 EARN DAILY Eldorado  Token EARN DAILY Eldorado  Token
EARN DAILY Eldorado Token
 
E Commerce
E CommerceE Commerce
E Commerce
 
Top blockchain platforms for digital marketing
Top blockchain platforms for digital marketingTop blockchain platforms for digital marketing
Top blockchain platforms for digital marketing
 
e-commerce and it's advantages and non benifit
e-commerce and it's advantages and non benifite-commerce and it's advantages and non benifit
e-commerce and it's advantages and non benifit
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)Blockchain presentation to isaca (kemp)
Blockchain presentation to isaca (kemp)
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Introduction to E-Commerce.pdf
Introduction to E-Commerce.pdfIntroduction to E-Commerce.pdf
Introduction to E-Commerce.pdf
 
E commerce and the mnc
E commerce and the mncE commerce and the mnc
E commerce and the mnc
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
 
Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)Future trends and legal aspects (111 kb)
Future trends and legal aspects (111 kb)
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
The Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerceThe Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerce
 

More from DeAnna Gossett

Elet5e ch01
Elet5e ch01Elet5e ch01
Elet5e ch01
DeAnna Gossett
 
Elet5e ch20
Elet5e ch20Elet5e ch20
Elet5e ch20
DeAnna Gossett
 
Elet5e ch19
Elet5e ch19Elet5e ch19
Elet5e ch19
DeAnna Gossett
 
Elet5e ch18
Elet5e ch18Elet5e ch18
Elet5e ch18
DeAnna Gossett
 
Elet5e ch17
Elet5e ch17Elet5e ch17
Elet5e ch17
DeAnna Gossett
 
Elet5e ch16
Elet5e ch16Elet5e ch16
Elet5e ch16
DeAnna Gossett
 
Elet5e ch15
Elet5e ch15Elet5e ch15
Elet5e ch15
DeAnna Gossett
 
Elet5e ch14
Elet5e ch14Elet5e ch14
Elet5e ch14
DeAnna Gossett
 
Elet5e ch13
Elet5e ch13Elet5e ch13
Elet5e ch13
DeAnna Gossett
 
Elet5e ch12
Elet5e ch12Elet5e ch12
Elet5e ch12
DeAnna Gossett
 
Elet5e ch11
Elet5e ch11Elet5e ch11
Elet5e ch11
DeAnna Gossett
 
Elet5e ch10
Elet5e ch10Elet5e ch10
Elet5e ch10
DeAnna Gossett
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
DeAnna Gossett
 
Elet5e ch08
Elet5e ch08Elet5e ch08
Elet5e ch08
DeAnna Gossett
 
Elet5e ch07
Elet5e ch07Elet5e ch07
Elet5e ch07
DeAnna Gossett
 
Elet5e ch06
Elet5e ch06Elet5e ch06
Elet5e ch06
DeAnna Gossett
 
Elet5e ch05
Elet5e ch05Elet5e ch05
Elet5e ch05
DeAnna Gossett
 

More from DeAnna Gossett (17)

Elet5e ch01
Elet5e ch01Elet5e ch01
Elet5e ch01
 
Elet5e ch20
Elet5e ch20Elet5e ch20
Elet5e ch20
 
Elet5e ch19
Elet5e ch19Elet5e ch19
Elet5e ch19
 
Elet5e ch18
Elet5e ch18Elet5e ch18
Elet5e ch18
 
Elet5e ch17
Elet5e ch17Elet5e ch17
Elet5e ch17
 
Elet5e ch16
Elet5e ch16Elet5e ch16
Elet5e ch16
 
Elet5e ch15
Elet5e ch15Elet5e ch15
Elet5e ch15
 
Elet5e ch14
Elet5e ch14Elet5e ch14
Elet5e ch14
 
Elet5e ch13
Elet5e ch13Elet5e ch13
Elet5e ch13
 
Elet5e ch12
Elet5e ch12Elet5e ch12
Elet5e ch12
 
Elet5e ch11
Elet5e ch11Elet5e ch11
Elet5e ch11
 
Elet5e ch10
Elet5e ch10Elet5e ch10
Elet5e ch10
 
Elet5e ch09
Elet5e ch09Elet5e ch09
Elet5e ch09
 
Elet5e ch08
Elet5e ch08Elet5e ch08
Elet5e ch08
 
Elet5e ch07
Elet5e ch07Elet5e ch07
Elet5e ch07
 
Elet5e ch06
Elet5e ch06Elet5e ch06
Elet5e ch06
 
Elet5e ch05
Elet5e ch05Elet5e ch05
Elet5e ch05
 

Recently uploaded

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 

Recently uploaded (11)

一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 

Chapter12

  • 1. Copyright © Terry Felke-Morris http://terrymorris.net Web Development & Design Foundations with HTML5 8th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright © Terry Felke-Morris
  • 2. Copyright © Terry Felke-Morris http://terrymorris.net Learning Outcomes In this chapter, you will learn how to ◦define e-commerce ◦identify benefits and risks of e-commerce ◦describe e-commerce business models ◦describe e-commerce security and encryption ◦define Electronic Data Interchange (EDI) ◦describe trends and projections for e-commerce ◦describe issues related to e-commerce ◦describe options for order and payment processing 2
  • 3. Copyright © Terry Felke-Morris http://terrymorris.net What is E-Commerce? The integration of communications, data management, and security technologies to allow individuals and organizations to exchange information related to the sale of goods and services. Major functions of E-Commerce include: ◦ the buying of goods, ◦ the selling of goods, and ◦ performance of financial transactions on the Internet. 3
  • 4. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Advantages for Businesses •Reduced Costs •Increased Customer Satisfaction •More Effective Data Management •Potentially Higher Sales 4
  • 5. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Advantages for Consumers •Convenience •Easier Comparison Shopping •Wider Selection of Goods 5
  • 6. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Risks for Businesses •Need for a robust, reliable web site •Fraudulent transactions •Customer reluctance to purchase online •Increased competition 6
  • 7. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Risks for Consumers •Possible Security Issues •Possible Privacy Issues •Purchasing from photos & descriptions •Possible difficulty with returns 7
  • 8. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Business Models •B2C – Business-to-Consumer •B2B – Business-to-Business •C2C – Consumer-to-Consumer •B2G – Business-to-Government 8
  • 9. Copyright © Terry Felke-Morris http://terrymorris.net Electronic Data Interchange (EDI) The transfer of data between different companies using networks. ◦Facilitates the exchange of standard business documents including purchase orders and invoices EDI is not new -- In existence since the 1960s Trading Partners ◦Organizations that exchange EDI transmissions Newer technologies ◦XML and Web Services are replacing traditional EDI ◦Provide opportunities to customize secure information exchange over the Internet 9
  • 10. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce U.S. Retail Sales 10 What do people buy online? 1. Clothing, accessories, and footwear ($40 billion) 2. Electronics and appliances ($22.75 billion) 3. Furniture and home furnishings ($20 billion) 4. Drugs, health aids, and beauty aids ($17 billion) 5. Computer hardware ($14.7 billion) 6. Music and videos ($10.25 billion) 7. Books and magazines ($10.2 billion) 8. Sporting goods ($7.8 billion) 9. Computer software ($5.41 billion) 10. Food, beer, and wine ($5.15 billion) 2013 Sales Figures http://www2.census.gov/retail/releases/current/arts/ecommerce4541.xls
  • 11. Copyright © Terry Felke-Morris http://terrymorris.net Who’s On the Internet?  Source: http://www.pewinternet.org/data-trend/internet-use/latest-stats/  Other Demographics: ◦ http://www.pewinternet.org/ ◦ http://www.clickz.com ◦ http://www.census.gov/eos/www/ebusiness614.htm 11 Category Percentage That Use the Internet Men 87% Women 86% Age: 18-29 97% Age: 30-49 93% Age: 50-64 88% Age: Over 65 57% Household Income: Less than $30,000 77% Household Income: $30,000 to $49,999 85% Household Income: $50,000 to $74,999 93% Household Income: $75,000 or higher 99% Education: High school graduate 77% Education: Some college 91% Education: College graduate 97%
  • 12. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Issues •Intellectual Property •Security •Fraud •Taxation •International Commerce 12
  • 13. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Security Encryption ◦ Ensures privacy within an organization and on the Internet. ◦ The conversion of data into an unreadable form, called a ciphertext. Decryption ◦ The process of converting the ciphertext back into its original form, called plaintext or cleartext, so it can be understood. The encryption/decryption process requires an algorithm and a key. 13
  • 14. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Security Encryption Types Secure E-Commerce transactions use the encryption technologies below: ◦Symmetric-key Encryption ◦Asymmetric-key Encryption ◦Hash Encryption SSL (Secure Sockets Layer) ◦Utilizes these encryption technologies ◦Provides for secure transmission of data on the Internet. 14
  • 15. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Security: Symmetric- Key Symmetric-Key Encryption Also called single-key encryption Both encryption and decryption use the same key Both the sender and receiver must know the key before communicating using encryption. Advantage: speed 15
  • 16. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Security: Asymmetric-key Asymmetric-Key Encryption Also called public-key encryption There is no shared secret Two keys are created at the same time: ◦ Public key ◦ Private key ◦ Asymmetric-key encryption is much slower than symmetric-key encryption. 16
  • 17. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Security: Hash Hash Encryption A hash algorithm transforms a string of characters into a “digest” ◦A shorter fixed-length value or key that represents the original string One-way encryption Used for information that will not be read or decrypted Purpose: verify the integrity of information 17
  • 18. Copyright © Terry Felke-Morris http://terrymorris.net Secure Sockets Layer (SSL) •A protocol that allows data to be privately exchanged over public networks •Developed by Netscape •Encrypts data sent between a client (usually a Web browser) and a Web server. •Utilizes both symmetric and asymmetric keys. •“https” protocol •Browsers display a “lock” icon 18
  • 19. Copyright © Terry Felke-Morris http://terrymorris.net Secure Sockets Layer (SSL) SSL provides secure communication between a client and server by using: ◦Server and (optionally) client digital certificates for authentication ◦Symmetric-key cryptography using a "session key" for bulk encryption ◦Public-key cryptography for transfer of the session key ◦Message Digests (hash encryption) to verify the integrity of the transmission 19
  • 20. Copyright © Terry Felke-Morris http://terrymorris.net SSL & Digital Certificate Digital Certificate ◦ A form of an asymmetric key  Also contains information about the certificate, the holder of the certificate, and the issuer of the certificate. ◦ Used by SSL to authenticate the identity of the web server 20
  • 21. Copyright © Terry Felke-Morris http://terrymorris.net Digital Certificate The contents of a digital certificate include: ◦ The public key ◦ Effective date of the certificate ◦ Expiration date of the certificate ◦ Details about the Certificate Authority -- the issuer of the certificate ◦ Details about the certificate holder ◦ A digest of the certificate content 21
  • 22. Copyright © Terry Felke-Morris http://terrymorris.net Certificate Authority A trusted third-party organization or company that issued digital certificates. Well-known Certificate Authorities: Verisign http://www.verisign.com Thawte http://www.thawte.com 22
  • 23. Copyright © Terry Felke-Morris http://terrymorris.net Checkpoint 1. Describe three advantages of e-commerce for an entrepreneur just starting a business. 2. Describe three risks that businesses face when engaging in e-commerce. 3. Define SSL. Describe how an online shopper can tell that an e-commerce site is using SSL. 23
  • 24. Copyright © Terry Felke-Morris http://terrymorris.net Order & Payment Processing E-Commerce Payment Methods: ◦Credit Card ◦Stored-value Card ◦Smart Card ◦Digital Cash 24
  • 25. Copyright © Terry Felke-Morris http://terrymorris.net E-Commerce Storefront Solutions Instant Online Storefront ◦ Shopify, BigCommerce Off-The-Shelf Shopping Cart Software ◦ Agoracart, osCommerce, ZenCart Custom Built Solution ◦ IBM's WebSphere Commerce Suite, Microsoft's Commerce Server ◦ Microsoft Visual Studio, Adobe Dreamweaver Semi-Custom Built Solutions on a Budget  Paypal order processing  Free shopping cart scripts 25
  • 26. Copyright © Terry Felke-Morris http://terrymorris.net Checkpoint 1. List three payment methods commonly used on the Web. 2. Have you purchased online? If so, think of the last item that you purchased. a. Why did you purchase it online instead of at a store? b. Did you check to see if the transaction was secure? Why or why not? c. How will your shopping habits be different in the future? 3. Describe three types of e-commerce solutions available. Which provides the easiest entry to e-commerce? Explain. 26
  • 27. Copyright © Terry Felke-Morris http://terrymorris.net Summary This chapter introduced you to basic e- commerce concepts and implementations. Consider taking an E-Commerce course in the future to continue your study of this dynamic and growing area of web development. 27