There is a growing compliance burden for merchants. In 2016 digital commerce faced a number of compliance hurdles: ADA, PCI, COPPA, and SOX, to name a few. There are even more growing concerns with EU and Brexit on the horizon for a global economy. How will retailers in the digital age face these new challenges? This talk will look specifically at ADA compliance, global recognition and challenges of these regulations, and how these factors will impact digital commerce.
With this presentation, explore the DOJ Effect on ADA Web Accessibility along with the latest trends in ADA Web Accessibility Lawsuits. You'll find out why Retail is the most targeted industry and what we predict for 2019. We can also help companies learn what to expect after receiving a lawsuit and the practical steps to mitigate the risk of litigation targeting your business!
To download the full 2018 infographic discussed in the presentation, click here: https://info.usablenet.com/2018-ada-web-accessibility-lawsuit-recap-report
For more information email us - contact@UsableNet.com
it includes the concept of electronic environment and SLEPT framework for macro environmental factor analysis. SLEPT framework deals with various Social, Legal, Economical, Political and Technological factors.
Topics Covered:
=================================================
Business Plan and Business Model
Ingredients of a Business Model
Major B2C Business Model
With this presentation, explore the DOJ Effect on ADA Web Accessibility along with the latest trends in ADA Web Accessibility Lawsuits. You'll find out why Retail is the most targeted industry and what we predict for 2019. We can also help companies learn what to expect after receiving a lawsuit and the practical steps to mitigate the risk of litigation targeting your business!
To download the full 2018 infographic discussed in the presentation, click here: https://info.usablenet.com/2018-ada-web-accessibility-lawsuit-recap-report
For more information email us - contact@UsableNet.com
it includes the concept of electronic environment and SLEPT framework for macro environmental factor analysis. SLEPT framework deals with various Social, Legal, Economical, Political and Technological factors.
Topics Covered:
=================================================
Business Plan and Business Model
Ingredients of a Business Model
Major B2C Business Model
The contents include introduction of commerce, traditional commerce and e-commerce, features and success factors of e-commerce, benefits and limitations of e-commerce, types of e-commerce and terminologies used in e-commerce.
The contents include introduction to mobile commerce, factors for M-commerce development, benefits and limitations of m-commerce, M-commerce applications, m-commerce communication technologies, WAP-Wireless Application Protocol, Challenges and Limitations of M-commerce etc
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
Building & Running A Successful Identity ProgramDan Houser
Two hour presentation on steps to build a successful identity access management program, including stakeholder buyin, strategy, roadmaps, selling I&AM, foundational components of I&AM, etc.
The solution to many corruption challenges in procurement is the use of advanced technology such as AI, data analytics and blockchain. This presentation was made at the MICG Annual Procurement Conference in Kuala Lumpur on 2nd April 2019.
The contents include introduction of commerce, traditional commerce and e-commerce, features and success factors of e-commerce, benefits and limitations of e-commerce, types of e-commerce and terminologies used in e-commerce.
The contents include introduction to mobile commerce, factors for M-commerce development, benefits and limitations of m-commerce, M-commerce applications, m-commerce communication technologies, WAP-Wireless Application Protocol, Challenges and Limitations of M-commerce etc
Ethical, Social, and Political Issues in E-commerceNor Ayuzi Deraman
Internet, like other technologies, can:
Enable new crimes
Affect environment
Threaten social values
Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines
Building & Running A Successful Identity ProgramDan Houser
Two hour presentation on steps to build a successful identity access management program, including stakeholder buyin, strategy, roadmaps, selling I&AM, foundational components of I&AM, etc.
The solution to many corruption challenges in procurement is the use of advanced technology such as AI, data analytics and blockchain. This presentation was made at the MICG Annual Procurement Conference in Kuala Lumpur on 2nd April 2019.
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
Many Federal agencies can benefit from the real-world experience of the financial services sector when it comes to best practices for big data management, cybersecurity, and fraud detection and mitigation. The reality is that most government organizations struggle to manage and reconcile financial information, as they must rely on a mix of legacy systems and newer applications to make fundamental business decisions. If you have big data challenges and are looking for a better way to streamline and secure data management to support your agency’s business and IT operations, plan to attend this session. This is your opportunity to understand how Hadoop can support your specific financial management mandates and help you use your organizational information to make defensible, data-driven decisions.
E-business vs. e-commerce. E-commerce and e-business are similar, with e-commerce referring to buying and selling products online. However, e-business defines a wider range of business processes by including aspects such as supply chain management (SCM), electronic order processing and customer relationship management (CRM) designed to help the company operate more effectively and efficiently.
business research topics for mba
mba topics for presentation
mba project topics
mba research topics in management
dissertation topics for mba
mba finance research topics
mba topics on strategic management
thesis topic for mba
e business information
e business pdf
e business definition
ericsson e business
list of e businesses
e business sv
tetra pak e business portal
e business examples
Oracle ACE Director Dan Morgan and Performance Tuning Corporation (PTC) Chief Strategy Officer Mark Swanholm present data security and the choices ahead for your organization. For more information about Performance Tuning Corporation, visit our website www.perftuning.com .
What is discussed in this presentation?
Security breaches and data theft have made big news headlines in recent months, from Target, to Home Depot and most recently Sony and Chick-Fil-A. Data is one of the most valuable assets in your business and organizations like yours need to be confident they are prepared for future security threats or risk loss of trust from customers and, possibly, unrecoverable financial losses.
But how do you approach security in your environment?
How confident are you that your data is secure?
And what are the objectives and right level of investment needed for the regulatory environment that exists today?
What about tomorrow – will the Security Wars leave your company devastated?
Oracle ACE Director Dan Morgan, an internationally recognized expert in database technology and former University of Washington lecturer, and Mark Swanholm, PTC’s Chief Strategy Officer and 22 year IT Veteran, address the issue of data security from the standpoint of what it is, how to approach it, and what is actually required to avoid being the next victim of hackers.
This Performance Tuning Corporation presentation is focusing on strategy, management, planning, and budgeting, and provides you and your management team the information they need to plan make the best possible decision with respect to an investment to secure your data.
Trust Exchange is a platform that allows companies to build secure, customizable networks in order to connect, collect, and directly exchange mission critical business information in real-time.
Through Network Effect Mechanics, our platform creates opportunities for more direct collaboration between information requestors, creators, and validators. Via this crowd-powered platform, we’re building a new marketplace for business information.
In this presentation Mark T. Warren (Director of Decision Science) talks about Big Data with Barclaycard, the foundations they built for it and their goals in the long term for it. Warren also discusses Barclaycard's learnings from building the foundation and how they're using these learnings and coping with market change and other challenges that can affect their long term goals.
"How to Start a Podcast" - Modern Content Marketing for Thought LeadershipPhillip Jackson
Starting a podcast has never been so easy, and so fraught with bad advice that is centered around "gear" or "growth hacks" - the key to building any audience is to create powerful connections and meaning for those that choose to be involved. In this talk, we review what it takes to create a content marketing engine and a personal brand using podcast as the beginning of a content pipeline.
Conversational Commerce and Magento 2: Breaking new ground with Facebook, Ale...Phillip Jackson
In this presentation given at ZendCon 2016 I detail the approach to building worthwhile conversational commerce experiences for Alexa and Facebook Messenger on Magento 2.
Times, they are a'changing. In this lightning talk we discuss the advantages and disadvantages to the many methods of installing Magento 2, particularly the Enterprise product.
"The Shopping Cart is Dead" - The Future of CommercePhillip Jackson
A new wave of commerce is upon us but it isn't going to be powered by the catalog-based shopping paradigms of 1990's dotcoms. Instead, this new wave of digital commerce will be powered by our voices, by our presence, by our social currency.
Presented at Magento Imagine 2016 this talk is intended for marketers, developers and store owners thinking about the future of their online business and how to anticipate the new customer acquisition channels in the years to come.
Beyond the Shopping Cart - Bronto Summit 2016Phillip Jackson
There’s been a major revolution in commerce, and you never even noticed: the shopping cart is dying. iPhones, Pinterest buy buttons, Amazon Dash, tokenization, apps and on-demand commerce have all changed how we buy products online. Hear about the future of online commerce and how that future is here today with a new sweet of order management and retail management tools provided by Magento.
In a 2009 poll "PCI Compliance" was found to be the most boring two-word combination in the English language. Building applications that stand up to the Machiavellian standards that are PCI compliance is just the beginning. The rest will put you to sleep; and could put you out of business!
The aim of this talk is to "hipsterify" PCI standards and create application toolkits that make passing PCI a breeze.
This talk will be exciting, fast paced, and humorous. It won't, however, make PCI fun.
7. • Differences between compliance and regulation
• Types of regulations and compliance burdens faced by digital commerce
• How to plan and budget for growing burden
• Case studies
Overview
8. Is there a difference?
Regulation vs Compliance
9. • Compliance usually is dictated by
complying with a standard or non-legal
set of requirements
• Identified by a working group or
standards body
• Economic repercussions
• In flux, evolving
• Adapts to change, culture, technology
• Less expensive
“In general standards groups
seek to create guidelines that
outline best practice in order to
prevent regulation by a
governmental body.”
Compliance
10. • A set of laws which has an oversight
body, usually a governmental or NGO
body which oversees enforcement
• Legal repercussions
• Long periods of time between revisions
• Outmoded by technology, culture
• More expensive
Regulation
12. PCI Compliance
• PCI (Payment Card Industry)
• Standards body made up of worldwide banks and gateways
• Effort to circumvent regulation by region
• Requirement imposed at-will on premium, non-essential services
• Combination of self-assessment and 3rd party
• Risk mitigation
14. ADA Compliance
• American Disability Act (1990)
• Legislation overseen by DOJ, IRS
• Increasingly websites under scrutiny
• Large brands require higher levels of compliance
16. COPPA
• Child Online Privacy and Protection Act (2013)
• Legislation overseen by FTC
• Simple rules to follow
• Don’t do business with children under 13
• Don’t collect data for children
• Don’t primarily (or secondarily) market to children
17. COPPA
• “Collect data”
• Full name
• Screen name or user name where it functions as online contact information
• A persistent identifier that can be used to recognize a user over time and across
different sites, including a cookie number, an IP address, a processor or device serial
number, or a unique device identifier
18. EU Privacy Directive
• Government regulation
• Privacy and control of Personally Identifiable Information as a human right*
• Requirement on all businesses for all people
* source: http://ec.europa.eu/justice/data-protection/
19. • Differences between compliance and regulation
• Types of regulations and compliance burdens faced by digital commerce
• How to plan and budget for growing burden
• Case studies
Overview
21. Start by saving
• Employ across disciplines
• Invest in training to save on hiring costs
• Invest in automation
• Limit unnecessary risk
22. Set expectations
• Anticipate large expenditures with increased demand and market segments. E.g.
investment in teen/tween goods or pushing above $6MM limit
• Invest in areas with largest impact
28. Costs: PCI Compliance
• Variables that affect PCI Costs:
• Business type
• Size of organization
• Level 1 (> $6MM in transactions -OR- > 1MM total transactions)
• Level 2 or 3 (at discretion of acquiring bank)
29. Costs: PCI Compliance
• Bottom line: costs scale significantly with your business:
• $300-10,000 for Levels 2-3 per annum
• $70,000 per audit for Level 1
30. Costs: PCI Levels 2 and 3
• Self-Assessment Questionnaire ~$50 - $200
• Vulnerability scanning ~ $100 - $150 per IP address
• Training and policy development ~ $70 per employee
• Remediation (software and hardware updates, etc.)
• Productivity Costs
http://blog.securitymetrics.com/2015/08/pci-compliance-cost.html
31. Costs: PCI Level 1
• Onsite audit ~ $40,000+
• Vulnerability scans ~ $800+
• Penetration testing ~ $5,000+
• Training and policy development ~ $5,000+
• Remediation (software and hardware updates, etc.) ~ Varies greatly based on where
entity is today in relation to compliance and security
http://blog.securitymetrics.com/2015/08/pci-compliance-cost.html
32. Costs: PCI Compliance
• Cost of a breech:
• Remediation: $25,000+
• Hosting Migration: $30-40,000
• Increase in rates from acquiring bank (or worse, blacklist)
http://blog.securitymetrics.com/2015/08/pci-compliance-cost.html
36. ADA Compliance: Definitions
• No such thing as “ADA Compliance”
• WCAG (Web Content Accessibility Guidelines) 2.0
• Accessibility
• “Design with Equity”
• The Persona Spectrum
39. “In the context of health experience, a
disability is any restriction or lack of
ability (resulting from an impairment)
to perform an activity in the manner or
within the range considered normal for
a human being.”
–World Health Organization, 1980
40. “Disability is not just a health problem.
It is a complex phenomenon, reflecting
the interaction between features of a
person’s body and features of the
society in which he or she lives.”
–World Health Organization, 2017
41. Business Costs: ADA Compliance
• Variables that affect ADA Costs:
• ADA predates the WWW (by 1 year)
• New build vs retrofit
• Certification vs “light accessibility”
• Legal threats
42. User Costs: ADA Compliance
• Everyday users are affected
• Productivity increases
• Accessibility exercises increase mobile conversion rate
43. Costs: ADA Compliance
• Some incentives
• “Empathetic design” (design with equity) increases mobile conversion rate
• 8% of Americans suffer with color blindness
• Tax implications:
• Access Credit Expenditures must be for Compliance with the ADA
• General Business Credit Limit
44. Costs: ADA Tax Incentives
• General Business Credit Limit
• Work Opportunity Credit
• Access Credit CapEx
• Strong indication applies to websites (IANAL):
• DOJ broadened its interpretation of the ADA to websites stating “The Department
has consistently interpreted the ADA to cover Web sites that are operated by public
accommodations and stated that such sites must provide their services in an
accessible manner or provide an accessible alternative to the Web site that is
available 24 hours a day, seven days a week.”
http://www.southwestada.org/html/publications/general/taxbulletin.html
45. Costs: ADA Compliance
• Levels of Compliance:
• WCAG (Web Content Accessibility Guidelines) 2.0 Levels A & AA are somewhat
affordable
• Layered costs by percentage addition during design-time
• 6-16% increase in development and testing time
• External audits may be required/requested
• Retrofit can be very difficult
• AAA is prohibitive
http://www.accessiq.org/standardguideline/web-content-accessibility-guidelines-wcag
46. Costs: ADA Compliance
• Example build:
• 1400-hour Reference Site Build
• 7% of budget was Accessibility
• 32% of budget was PM / QA (compared at 30% nominal)
http://www.accessiq.org/standardguideline/web-content-accessibility-guidelines-wcag
48. Costs: COPPA Compliance
• Build tools to cope with PII demands
• Analytics woes/issues with cookie data collection
• Purchasing challenges
• Age gating
• Sharing selections
http://www.accessiq.org/standardguideline/web-content-accessibility-guidelines-wcag
50. Where Magento 2 can Help
• PCI compliance
• Out of box lowest-level PCI risk (directpost/iframe only payment methods)
• ADA Compliance
• M2 has ARIA features, skip to content links, tab navigation, great support for alt text, does many
things correctly out of the box
• Some reasonable tradeoffs, some features require compromise
• COPPA
• Wishlist
• Cookie policy
51. Where Magento 2 Needs Help
• ADA Compliance
• Return of focus
• Repetition of spoken text/terms
• COPPA
• Age gating
• Web chat, reviews, contact us
52. • Differences between compliance and regulation
• Types of regulations and compliance burdens faced by digital commerce
• How to plan and budget for growing burden
• Case studies
• Resources
Overview
55. Maddie Case Study: COPPA
• Age Gate
• Share to Buy
• Cookie / Data collection requirements
• Privacy Policy which complies with COPPA
• Marketing and photography consistent with demographic of target audience
56.
57. Papyrus Case Study: ADA
• WCAG 2.0 AA
• Modals
• Keyboard Navigation
• Voice/Screen Reader
60. • Differences between compliance and regulation
• Types of regulations and compliance burdens faced by digital commerce
• How to plan and budget for growing burden
• Case studies
• Resources
Overview