SlideShare a Scribd company logo
1 of 20
Pieces of the E-commerce Site-Building Puzzle Copyright © 2004 Pearson Education, Inc.
The Systems Development Life Cycle Systems Development Life Cycle (SDLC) is a methodology for understanding the business objectives of a system and designing an appropriate solution Five major steps in the SDLC are: ,[object Object]
Systems design
Building the system
Testing
ImplementationSlide 4-3
Web Site Systems Development Life Cycle Slide 4-4
A Logical Design for a Simple Web Site
Choices in Building and Hosting Figure 4.4, Page 203 Copyright © 2004 Pearson Education, Inc. Slide 4-6
The Spectrum of Tools for Building Your Own E-commerce Site Slide 4-7
Costs of Customizing E-commerce Packages Slide 4-8
Testing, Implementation and Maintenance Testing:  ,[object Object],Implementation and maintenance:  ,[object Object]
Benchmarking: process by which site is compared to those of competitors in terms of response speed, quality of layout and designSlide 4-9
Components of a Web Site Budget Slide 4-10
Key Players in Web Server Software Slide 4-11
Basic Functionality Provided by Web Servers Slide 4-12
Widely Used Midrange and High-end E-commerce Suites Slide 4-13
Security Threats in the E-commerce Environment Three key points of vulnerability: ,[object Object]
Server

More Related Content

Viewers also liked (18)

2011 04 Asia
2011 04 Asia2011 04 Asia
2011 04 Asia
 
CESA International Business. 2011.01
CESA International Business. 2011.01CESA International Business. 2011.01
CESA International Business. 2011.01
 
Asian Econ 2011 01
Asian Econ 2011 01Asian Econ 2011 01
Asian Econ 2011 01
 
Sustainability 04 CESA
Sustainability 04 CESASustainability 04 CESA
Sustainability 04 CESA
 
American studies 2016 03
American studies 2016 03American studies 2016 03
American studies 2016 03
 
American studies 2016 02
American studies 2016 02American studies 2016 02
American studies 2016 02
 
Emarketing 2011.1
Emarketing 2011.1Emarketing 2011.1
Emarketing 2011.1
 
Sustainability 05
Sustainability 05Sustainability 05
Sustainability 05
 
2011.08 marketing principles
2011.08 marketing principles2011.08 marketing principles
2011.08 marketing principles
 
American studies 2016 01
American studies 2016 01American studies 2016 01
American studies 2016 01
 
2011.02.cesa ib 02
2011.02.cesa ib 022011.02.cesa ib 02
2011.02.cesa ib 02
 
IB 2.2 Silicon valley
IB 2.2 Silicon valleyIB 2.2 Silicon valley
IB 2.2 Silicon valley
 
Apachecon Rails
Apachecon RailsApachecon Rails
Apachecon Rails
 
CESA: IB 2011 04
CESA: IB 2011 04CESA: IB 2011 04
CESA: IB 2011 04
 
Politics 2011.03
Politics 2011.03Politics 2011.03
Politics 2011.03
 
2011.2.13 marketing
2011.2.13 marketing2011.2.13 marketing
2011.2.13 marketing
 
2011.07 Marketing
2011.07 Marketing2011.07 Marketing
2011.07 Marketing
 
Template 2009.01
Template 2009.01Template 2009.01
Template 2009.01
 

Similar to Ecmon 0.5

Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to EarthSri Chalasani
 
IT8005_EC_Unit_II_Building_ECommerce
IT8005_EC_Unit_II_Building_ECommerceIT8005_EC_Unit_II_Building_ECommerce
IT8005_EC_Unit_II_Building_ECommercePalani Kumar
 
01 Outsource To India New Creation It
01 Outsource To India New Creation It01 Outsource To India New Creation It
01 Outsource To India New Creation ItoutsourceToIndia
 
Mainstream Development - the best software developers for you and us
Mainstream Development - the best software developers for you and usMainstream Development - the best software developers for you and us
Mainstream Development - the best software developers for you and usIrena Ruzhanskaya
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Servicesssphelps
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech ServicesSEdwardPhelps
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Servicesssphelps
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share PointArt Upton
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMichael Nickle
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slidesmonchai sopitka
 
[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principlesOWASP
 
Biz Nova It Project Bonus Slides
Biz Nova It Project Bonus SlidesBiz Nova It Project Bonus Slides
Biz Nova It Project Bonus SlidesTyHowardPMP
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 

Similar to Ecmon 0.5 (20)

IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
Bringing the Cloud Back to Earth
Bringing the Cloud Back to EarthBringing the Cloud Back to Earth
Bringing the Cloud Back to Earth
 
IT8005_EC_Unit_II_Building_ECommerce
IT8005_EC_Unit_II_Building_ECommerceIT8005_EC_Unit_II_Building_ECommerce
IT8005_EC_Unit_II_Building_ECommerce
 
01 Outsource To India New Creation It
01 Outsource To India New Creation It01 Outsource To India New Creation It
01 Outsource To India New Creation It
 
Mainstream Development - the best software developers for you and us
Mainstream Development - the best software developers for you and usMainstream Development - the best software developers for you and us
Mainstream Development - the best software developers for you and us
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
 
2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services2011 09 19 Radiss Tech Services
2011 09 19 Radiss Tech Services
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
DLP
DLPDLP
DLP
 
D Cornell Securing Share Point
D Cornell Securing Share PointD Cornell Securing Share Point
D Cornell Securing Share Point
 
e-commerce.pptx
e-commerce.pptxe-commerce.pptx
e-commerce.pptx
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
 
[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles[Warsaw 26.06.2018] SDL Threat Modeling principles
[Warsaw 26.06.2018] SDL Threat Modeling principles
 
Biz Nova It Project Bonus Slides
Biz Nova It Project Bonus SlidesBiz Nova It Project Bonus Slides
Biz Nova It Project Bonus Slides
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 

More from Stephan Langdon (20)

Conceptual framework
Conceptual frameworkConceptual framework
Conceptual framework
 
Eugeneexample2
Eugeneexample2Eugeneexample2
Eugeneexample2
 
Eugene example
Eugene exampleEugene example
Eugene example
 
Im2019.2product
Im2019.2productIm2019.2product
Im2019.2product
 
Q5
Q5Q5
Q5
 
Q4
Q4Q4
Q4
 
Ammidq3
Ammidq3Ammidq3
Ammidq3
 
Ammidq2
Ammidq2Ammidq2
Ammidq2
 
AmMidq1
AmMidq1AmMidq1
AmMidq1
 
IndustryAm
IndustryAmIndustryAm
IndustryAm
 
Neg2019lewis
Neg2019lewisNeg2019lewis
Neg2019lewis
 
Eu gro
Eu groEu gro
Eu gro
 
Neg 2019.2d
Neg 2019.2dNeg 2019.2d
Neg 2019.2d
 
Euro2
Euro2Euro2
Euro2
 
American2019.2.2
American2019.2.2American2019.2.2
American2019.2.2
 
Im2019.2.5
Im2019.2.5Im2019.2.5
Im2019.2.5
 
American2019.2.2
American2019.2.2American2019.2.2
American2019.2.2
 
Im2019.2.4
Im2019.2.4Im2019.2.4
Im2019.2.4
 
Im2019.2 weekthree
Im2019.2 weekthreeIm2019.2 weekthree
Im2019.2 weekthree
 
Neg 2019.2 week3
Neg 2019.2 week3Neg 2019.2 week3
Neg 2019.2 week3
 

Ecmon 0.5