SlideShare una empresa de Scribd logo
1 de 27
E-commerce Technology for
       Safe Money Transaction Over the net
                y

                             Presented and Published
                                             b
    National Conference on Automation in Banks and Financial Institutions
       22-23 June 2000 organized by IETE Chandigarh, held at CSIO Chandigarh


Presenter
Noorjahan Haque
Faculty, Information technology
Institute of Electronics & Telecommunication Engineers (IETE)
Chandigarh

                                                                              Co-Author
                                                                        Raman K. Attri
                                                                Member IETE / Scientist,
                                      Central Scientific Instruments Organization (CSIO)
                                                                            Chandigarh




                        Copyrights © 2000 Neeru Haque / R. K. Attri
Agenda


Evolution of E-commerce
features of E-Commerce
Technology behind E-com
Money Safety issues and measures




           Copyrights © 2000 Neeru Haque / R. K. Attri
Meaning of E-commerce

E commerce
E-commerce stands for every kind of money transaction
                                             transaction,
selling, purchasing or exchange of services or products
over the Internet
Web shopping is only a small part of the e-commerce
picture. The term also refers to online stock and bond
transactions and buying and downloading software
without ever going near a store.
In addition, e-commerce includes business-to-business
connections that make purchasing easier f
         i     h        k        h i       i     for bi
                                                      big
corporations.


             Copyrights © 2000 Neeru Haque / R. K. Attri
Evolution of E-Commerce

The e-commerce and e-business has evolved through a set
of technological changes coming in picture
Internal     Computerization        in    the company
(Computerization and internal Networking with no outer
world interaction)
Electronics         Data         Interchange      with
suppliers(Extension of Internal network to suppliers to
access company data base)
Internet Connectivity to End Users (Extension of
                               End-Users
external network to end users)
E-commerce Revolution (money transaction, selling
                                     y                g
and purchasing over the internet)
             Copyrights © 2000 Neeru Haque / R. K. Attri
Typical Evolutionary Path of E-Com
                      Too clumsy
                                                              E-mail usage
                                                                                  Sophisticated
                                      Company Wide
  Simple E-mail                                                                   E-mail System
                                         E-mail

                                                                                                        Need employee info
                                                             Little return on
                                                             investment
  Simple Web            ignored                                                 Dynamic/interactive                  Secure info to
                                      Sophisticated Static
                                        p
    brochure
    b h                                                                             Web it
                                                                                    W b site                        Trading
                                                                                                                    T di partners
                                                                                                                               t
                                          Web sites

                                                                             Need to update info             Need partner and
                                     Difficult to maintain
                                                                                                             security info
                                                               Meet internal
                                                               Demands
Basic Internal info    Little used     Web maintenance                              Key Internal                      Back office
   on Intranet                             System                                Database on Internet                system linked

                                                                                                        Improved internal     Need back
                                                               Need product info           Customer     functionality
                                                                                                                    y         office info
                                                                                           info

 Simple On-line        Few sales                                                      Customers                     Stock control ,
                                        Full Catalogue
     Sales                                                                           Personalized                  shipment tracking
                                                              Want to
                                                              keep customers                            Reduced cost
                                                                                                        improved efficiency

                                                                                   Next Generation E-business
                                      Copyrights © 2000 Neeru Haque / R. K. Attri
Technologies contributing in E-com

•   Recent advances in telecommunications and computer
    technologies h
        h l i have moved computer networks to the center of the
                               d                    k     h          f h
    international economic infrastructure.
•   Heavy rise in Internet and the World Wide Web has
    transformed global commerce b
         f      d   l b l                by f ili i
                                              facilitating iinstantaneous,
    inexpensive contact among sellers, buyers, investors, advertisers and
    financiers anywhere in the world.
•   The
    Th      rapidid   integration
                      i t      ti       of
                                         f    Internet
                                              I t       t   andd    other
                                                                     th
    telecommunications-based functions into nearly every sphere
    of business has led to an international focus on the New World of e-
    commerce.
    commerce




                   Copyrights © 2000 Neeru Haque / R. K. Attri
E-commerce Setup

          Electronic commerce encompasses all business
          conducted b means of computer networks
             d     d by       f                 k
 Server
                                                   ISP
               Back Office
               links
                                                    Internet

                                    Back                       Client
                  ISP               Bone                        PC
My LAN                              Net

                   Total Quality of service
              Copyrights © 2000 Neeru Haque / R. K. Attri
Business Communication: Old Way




   Company A                 POST


                                  FAX

                 Proprietary Data Comm         Company B
                       (EDI/VANs




        Copyrights © 2000 Neeru Haque / R. K. Attri
Challenges in going E-commerce

Getting into e-commerce is not as simple as setting up a Web page
             e commerce
with an order form.
There are three big internal challenges in "e-enabling" business. All of
them have to be overcome to have a complete end-to-end e-business
                                                end to end e business
running.
a)The first is to take your back-office processes online and to automate
your workflow
b)The second challenge is to make data-sharing possible across
disparate applications like your ERP systems, your supplier’s systems,
and your e-commerce order-taking systems
                                      systems.
c) Third is to automate your decision-making process.




                 Copyrights © 2000 Neeru Haque / R. K. Attri
Impacts of E-Commerce

Electronic business is using innovative technology to build
relationships and commerce globally and is the greatest
opportunity and/or threat to existing business models
The e commerce has changed the way the business is done
     e-commerce
The mode of communication is changing big way both in
and outside the company. The old way of correspondence
is obsoleting and new way, through internet and intranet
are in picture.




              Copyrights © 2000 Neeru Haque / R. K. Attri
Business Communication: Internet Way



                                        Internet Server

      Company A                              •Web
                                              Wb
                                          •E-mail etc
                                                                        Company X




FAX/Post/point to point
(to known location)
                               Company B




                          Copyrights © 2000 Neeru Haque / R. K. Attri
Business Communication: Intranet Way




                                      Company X
                     Company A

    Company B

                                         Community of Trust

   FAX/Post/point to point
   (to known location)        Internet Server
                              I        S
                                                              Company X
                                   •Web
                                •E-mail etc


                Copyrights © 2000 Neeru Haque / R. K. Attri
Elements of Trustworthy E-commerce Services



  The i i l l
  Th principal elements of t t
                         t f trustworthy i th context of on-line
                                       th in the     t t f    li
  commercial transactions are:
• Security: Information transmitted during a transaction will
  arrive i uncorrupted f
     i in             t d form and will not b i
                                  d ill t be improperly l k d t
                                                       l leaked to
  others.
  Privacy: Protection to access and use of personal information
  obtained as a result of electronic t
   bt i d            lt f l t     i transactions.
                                            ti
  Authenticity: Verification that the parties to a transaction,
  and the services rendered, are truly as represented.
  Non-repudiability: Assurance that a transaction will be
  honored as agreed and that each party can prove the validity of
  the terms of the deal in the court.


                 Copyrights © 2000 Neeru Haque / R. K. Attri
E-commerce Security Issues

Security is the biggest issue of E commerce
                                 E-commerce.
Secure e-commerce transaction has to insure protection of
assets and privacy.
            p     y
It should give reliable service, audit and accountability and
identification procedure
Business and government i i i
    i         d                  institutions must d l
                                                     develop
policies that build greater trust in the new transaction
media




               Copyrights © 2000 Neeru Haque / R. K. Attri
E-commerce Security Technologies

(To be used in combination to ensure security)
  Encryption (coding of messages)
  Cryptography (data transmission security by encryption
  of contents of message)
   f     t t f          )
  Digital Signature (To prove that it's really genuine user -
  Its really me!)
   ts ea y e!)
  Digital Certificate (user authentic identity-who am I?)
  Firewall ( network and traffic watch             to avoid
  unauthorized access of the network resources)



                Copyrights © 2000 Neeru Haque / R. K. Attri
Encryption

Coding the transmitted message or credit card number with the help of
some algorithm and a encryption key.
Encryption provide security in           highly-networked environment
Applications include protecting files from theft or unauthorized access,
keeping communications secure from interception, and facilitating
secure transactions
Highly secure encryption can be deployed fairly cheaply
2.0 versions of Netscape Navigator and Microsoft Internet Explorer
facilitate transactions encrypted using Secure Sockets Layer (SSL), a
protocol that creates a secure connection to the server, protecting the
information as it travels over the Internet
When Web site is secured by SSL, the URL begins with https instead of
http.


                 Copyrights © 2000 Neeru Haque / R. K. Attri
Cryptography


Encrypting the contents with one key and decrypting with
another key. One is called private key and other is called
public key. The message encrypted using receiver's public
key can be decrypted only by receiver's private key
It is used to guarantee integrity (i.e. that the contents of a
file or message have not been altered) to establish the
                                    altered),
identity of a party, or to make legal commitments.
The strong crypto-system are now available which use
different algorithms like DES, IDEA and RSA



               Copyrights © 2000 Neeru Haque / R. K. Attri
Digital Signature

Now in e-commerce the issue that how one know that
it is really me? Evolving a digital signature does it.
The digital signature is kind of message, known to me
only and representing me. It is encrypted using my
private key and anyone can decrypt it using my public
key.
The reception end, i i proved h I h
  h         i     d it is       d hat have encoded the
                                                 d d h
message and signed it.
This technology makes the basis for the electronics
cash. This is also the basis for user authentication and
non-repudiation.


            Copyrights © 2000 Neeru Haque / R. K. Attri
Digital Certificate


Just signing on my messages is not enough A identity
                                      enough.
has to be assigned to the fellow using the e-commerce
services. It reflects who am I? This is digital signature.
These digital certificates are issued by some trusted
third party.
A di it l registry of all di it l certificate h ld
   digital     i t     f ll digital   tifi t holders i  is
made.
The client negotiates with the registry before doing
                g                   g y                  g
business with the server. Severs have the user's
signature


            Copyrights © 2000 Neeru Haque / R. K. Attri
FireWall

The firewalls are basically a software or set of
protocols which isolate the networks and the traffics
The fireball have following three objectives:
-It keeps out external threats like virus and
unauthorized access from external person.
-it pre ent internal sensiti e data to be transmitted
 it prevent            sensitive
outside without authorization.
-It prevent internal attacks
    p
 Firewalls itself are not full proof security techniques



             Copyrights © 2000 Neeru Haque / R. K. Attri
Safe Money Transaction Technologies

Credit Cards      (for purchasing at Point of sale counter using card
                       p          g                             g
reader and web based on-line transaction on credit. Instant validation
of account and deduction after the sale)
Smart Card Digital Currency          (In form of smart card for all
kinds of payments an on the instant deduction of money from the
account)
Electronics Ch
El      i   Cheques            (pre-issued software modules each
representing certain cash value, to be exchanged over the internet in
place of any money or smart card number)
Hybrid Mode (includes major and minor payment by smart card,
coins, cheques etc--all in one)



                  Copyrights © 2000 Neeru Haque / R. K. Attri
Credit Card

Internationally accepted mode of payment in two forms
     Credit card at Point of Sale Counter (POS terminal
  reads the card details and verify it over phone lines
  from the acquiring bank and credit card issuing bank)
     Web Based Online-Credit Card Payment System
  (validation over the net through servers)
SET protocol encodes the credit card numbers on
vendors' servers so that only banks and credit card
companies can read it
The disadvantages of the credit card is that a third party
approval like bank and its fees is involved

              Copyrights © 2000 Neeru Haque / R. K. Attri
Digital Currency

This is basically two mode meant both for major and micro-payments :
a smart card technology
digital coins
The smart card reader reads the smart card inserted in the smart card
reader hardware cartridge and sends the account information from the
card to the the issuing bank over the internet and after validation the
amount being paid online is deducted form the account of the person's
              gp                                               p
account.
One more option is digital coins in form of software modules having
unique identification number and particular amount. Can be submitted
   q                              p
over the net for purchasing. Retailer can further use it for his own
purpose and recycle it



                 Copyrights © 2000 Neeru Haque / R. K. Attri
Electronics Cheques

These are pre-issued cards replacing cheque Each
             pre issued                  cheque.
card module represent some predefined cash amount.
It is to be submitted where purchasing is being done.
No need of validation and third party involvement
unlike credit card transactions.
Cheaper as third part fees is not in ol ed
                   party          involved.
 Since the cheques are generally used in public, this
mode of money transaction is expected to be quite
                 y                  p            q
popular.



           Copyrights © 2000 Neeru Haque / R. K. Attri
Hybrid Mode -Cybercash

The Cybercash i getting wide popularity among the world
Th C b          h is     i      id        l i           h ld
leader banks, merchants and users globally. The cybercash
interface with many leading financial institutions.
                      y        g
It facilitate hybrid mode of payment which include credit
card payment system working on SET protocols and
Cybercoin system f payment f
C b       i     t    for           t from $0 25 t $10
                                          $0.25 to $10.
It also support electronics cheques providing pay now
facility for interactive billing applications.
       y                       g pp




               Copyrights © 2000 Neeru Haque / R. K. Attri
The arena of E-business

E-Business is the powerful business environment that is
created when critical business systems are connected
directly to customers, employees, vendors, and business
partners using intranets, extranets, E-Commerce   E Commerce
technologies, collaborative applications, and the Web.
Developing E-Business successfully means building
reliable, scalable systems f
  li bl       l bl              for security, collaboration,
                                           i        ll b   i
messaging,      E-Commerce         payments,      supply-chain
management, sales force, data warehousing, and customer
      g       ,           ,                   g,
relations - and integrating all of this with existing back-end
operations


               Copyrights © 2000 Neeru Haque / R. K. Attri
About the author

Noor Jahan Haque earned her Masters in Information technology
in 1999. She served at IETE as associate faculty from 2000-2001.
neeruhaque2000@yahoo.com
        q          y



Raman K. Attri, Masters in Technology (Applied Electronics)
served as senior scientist at CSIO Chandigarh from 1995-2005. His
                                                      1995 2005.
specialization is in Instrumentation systems. rkattri@rediffmail.com




                Copyrights © 2000 Neeru Haque / R. K. Attri

Más contenido relacionado

La actualidad más candente

Business: Security & Privacy
Business: Security & PrivacyBusiness: Security & Privacy
Business: Security & PrivacyJeremy Hilton
 
It in b (n)
It in b (n)It in b (n)
It in b (n)GTV
 
Managed It Services Us
Managed It Services UsManaged It Services Us
Managed It Services Usurbantech
 
Bigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationBigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationStanford University
 
Patrick McLean: Verizon Interactive: A Case Study for Marketing Transformation
Patrick McLean: Verizon Interactive: A Case Study for Marketing TransformationPatrick McLean: Verizon Interactive: A Case Study for Marketing Transformation
Patrick McLean: Verizon Interactive: A Case Study for Marketing Transformation[x+1]
 
Enabling the digital economy: Postal services 2020
Enabling the digital economy: Postal services 2020Enabling the digital economy: Postal services 2020
Enabling the digital economy: Postal services 2020angelic961
 
E12 Sox And Identity Management
E12 Sox And Identity ManagementE12 Sox And Identity Management
E12 Sox And Identity ManagementAlexandre Luna
 
Loomis Presentation
Loomis PresentationLoomis Presentation
Loomis Presentationbgreen303
 
Reduce & Eliminate, Wasteful & Redundant Tasks
Reduce & Eliminate, Wasteful & Redundant TasksReduce & Eliminate, Wasteful & Redundant Tasks
Reduce & Eliminate, Wasteful & Redundant Tasksbboggs
 
AnswerNet Media Kit 01.11
AnswerNet Media Kit 01.11AnswerNet Media Kit 01.11
AnswerNet Media Kit 01.11Eric Springer
 
Supplier Collaboration - Doing it the right way
Supplier Collaboration - Doing it the right waySupplier Collaboration - Doing it the right way
Supplier Collaboration - Doing it the right wayManthan
 
How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...
How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...
How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...SAP Ariba
 
Enrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEnrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEinat Shimoni
 
Is Your E-Sourcing a Trick or Treat? A CombineNet Presentation
Is Your E-Sourcing a Trick or Treat? A CombineNet PresentationIs Your E-Sourcing a Trick or Treat? A CombineNet Presentation
Is Your E-Sourcing a Trick or Treat? A CombineNet PresentationCombineNet, Inc.
 

La actualidad más candente (19)

Business: Security & Privacy
Business: Security & PrivacyBusiness: Security & Privacy
Business: Security & Privacy
 
It in b (n)
It in b (n)It in b (n)
It in b (n)
 
Managed It Services Us
Managed It Services UsManaged It Services Us
Managed It Services Us
 
Radiant Communications
Radiant CommunicationsRadiant Communications
Radiant Communications
 
Bigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps PresentationBigdata Final NSF I-Corps Presentation
Bigdata Final NSF I-Corps Presentation
 
Patrick McLean: Verizon Interactive: A Case Study for Marketing Transformation
Patrick McLean: Verizon Interactive: A Case Study for Marketing TransformationPatrick McLean: Verizon Interactive: A Case Study for Marketing Transformation
Patrick McLean: Verizon Interactive: A Case Study for Marketing Transformation
 
Rubik Introduction Feb2010
Rubik Introduction Feb2010Rubik Introduction Feb2010
Rubik Introduction Feb2010
 
Enabling the digital economy: Postal services 2020
Enabling the digital economy: Postal services 2020Enabling the digital economy: Postal services 2020
Enabling the digital economy: Postal services 2020
 
E12 Sox And Identity Management
E12 Sox And Identity ManagementE12 Sox And Identity Management
E12 Sox And Identity Management
 
Loomis Presentation
Loomis PresentationLoomis Presentation
Loomis Presentation
 
Reduce & Eliminate, Wasteful & Redundant Tasks
Reduce & Eliminate, Wasteful & Redundant TasksReduce & Eliminate, Wasteful & Redundant Tasks
Reduce & Eliminate, Wasteful & Redundant Tasks
 
The 3 Stages of E-Commerce
The 3 Stages of E-CommerceThe 3 Stages of E-Commerce
The 3 Stages of E-Commerce
 
AnswerNet Media Kit 01.11
AnswerNet Media Kit 01.11AnswerNet Media Kit 01.11
AnswerNet Media Kit 01.11
 
Supplier Collaboration - Doing it the right way
Supplier Collaboration - Doing it the right waySupplier Collaboration - Doing it the right way
Supplier Collaboration - Doing it the right way
 
Manthan
Manthan Manthan
Manthan
 
How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...
How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...
How Smart Invoicing Enables Straight-Through Processing for All of Your Suppl...
 
Enrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdfEnrterprise Apps Cio Summit 2009pdf
Enrterprise Apps Cio Summit 2009pdf
 
Forretnings- & Teknologi Trends af Bjarne Jensen, NetCity
Forretnings- & Teknologi Trends af Bjarne Jensen, NetCityForretnings- & Teknologi Trends af Bjarne Jensen, NetCity
Forretnings- & Teknologi Trends af Bjarne Jensen, NetCity
 
Is Your E-Sourcing a Trick or Treat? A CombineNet Presentation
Is Your E-Sourcing a Trick or Treat? A CombineNet PresentationIs Your E-Sourcing a Trick or Treat? A CombineNet Presentation
Is Your E-Sourcing a Trick or Treat? A CombineNet Presentation
 

Destacado

e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce TechnologyDivante
 
E - commerce As a part of information sys
E - commerce As a part of information sysE - commerce As a part of information sys
E - commerce As a part of information sys07Deeps
 
Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...
Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...
Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...Raj Gupta
 
Project Management at First National Bank
Project Management at First National BankProject Management at First National Bank
Project Management at First National BankIsis Quiñones
 
MS Access and Database Fundamentals
MS Access and Database FundamentalsMS Access and Database Fundamentals
MS Access and Database FundamentalsAnanda Gupta
 
Cinnamonhotel saigon 2013_01
Cinnamonhotel saigon 2013_01Cinnamonhotel saigon 2013_01
Cinnamonhotel saigon 2013_01cinnamonhotel
 
Bernoullis Random Variables And Binomial Distribution
Bernoullis Random Variables And Binomial DistributionBernoullis Random Variables And Binomial Distribution
Bernoullis Random Variables And Binomial DistributionDataminingTools Inc
 
Bind How To
Bind How ToBind How To
Bind How Tocntlinux
 
Traffic Skills, Parent & Kids Intro
Traffic Skills, Parent & Kids IntroTraffic Skills, Parent & Kids Intro
Traffic Skills, Parent & Kids IntroEugene SRTS
 
Data Applied: Developer Quicklook
Data Applied: Developer QuicklookData Applied: Developer Quicklook
Data Applied: Developer QuicklookDataminingTools Inc
 

Destacado (20)

e-Commerce Technology
e-Commerce Technologye-Commerce Technology
e-Commerce Technology
 
E commerce ppt.
E commerce ppt.E commerce ppt.
E commerce ppt.
 
E - commerce As a part of information sys
E - commerce As a part of information sysE - commerce As a part of information sys
E - commerce As a part of information sys
 
Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...
Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...
Best Healthcare and Hospital Website Project Work Done by E Vision Technologi...
 
E business
E businessE business
E business
 
Project Management at First National Bank
Project Management at First National BankProject Management at First National Bank
Project Management at First National Bank
 
MS Access and Database Fundamentals
MS Access and Database FundamentalsMS Access and Database Fundamentals
MS Access and Database Fundamentals
 
Data Applied:Decision Trees
Data Applied:Decision TreesData Applied:Decision Trees
Data Applied:Decision Trees
 
Cinnamonhotel saigon 2013_01
Cinnamonhotel saigon 2013_01Cinnamonhotel saigon 2013_01
Cinnamonhotel saigon 2013_01
 
LISP: Type specifiers in lisp
LISP: Type specifiers in lispLISP: Type specifiers in lisp
LISP: Type specifiers in lisp
 
How To Make Pb J
How To Make Pb JHow To Make Pb J
How To Make Pb J
 
Ccc
CccCcc
Ccc
 
Bernoullis Random Variables And Binomial Distribution
Bernoullis Random Variables And Binomial DistributionBernoullis Random Variables And Binomial Distribution
Bernoullis Random Variables And Binomial Distribution
 
Test
TestTest
Test
 
Association Rules
Association RulesAssociation Rules
Association Rules
 
Bind How To
Bind How ToBind How To
Bind How To
 
R Environment
R EnvironmentR Environment
R Environment
 
Simulation
SimulationSimulation
Simulation
 
Traffic Skills, Parent & Kids Intro
Traffic Skills, Parent & Kids IntroTraffic Skills, Parent & Kids Intro
Traffic Skills, Parent & Kids Intro
 
Data Applied: Developer Quicklook
Data Applied: Developer QuicklookData Applied: Developer Quicklook
Data Applied: Developer Quicklook
 

Similar a E-commerce Technology for Safe money transaction over the net

Case Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless EnterpriseCase Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless EnterpriseAppirio
 
Internet on business_print
Internet on business_printInternet on business_print
Internet on business_printFrancis George
 
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...SSA KPI
 
Plugin ch12edited-ok
Plugin ch12edited-okPlugin ch12edited-ok
Plugin ch12edited-okdonasiilmu
 
2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatureseSignLive by VASCO
 
Greening Your IT Mindset
Greening Your IT MindsetGreening Your IT Mindset
Greening Your IT MindsetCybera Inc.
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho SchmidtHPDutchWorld
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho SchmidtHPDutchWorld
 
Google ebda2 - eCommerce - Souq.com
Google ebda2 - eCommerce - Souq.comGoogle ebda2 - eCommerce - Souq.com
Google ebda2 - eCommerce - Souq.comMahmoud Said
 
PAETEC Solutions Portfolio
PAETEC Solutions PortfolioPAETEC Solutions Portfolio
PAETEC Solutions PortfolioBlake Sanders
 
Transaction-based Capacity Planning for greater IT Reliability™ webinar
Transaction-based Capacity Planning for greater IT Reliability™ webinar Transaction-based Capacity Planning for greater IT Reliability™ webinar
Transaction-based Capacity Planning for greater IT Reliability™ webinar Metron
 

Similar a E-commerce Technology for Safe money transaction over the net (20)

Case Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless EnterpriseCase Study - Appirio as the Serverless Enterprise
Case Study - Appirio as the Serverless Enterprise
 
Internet on business_print
Internet on business_printInternet on business_print
Internet on business_print
 
B2B eCommerce
B2B eCommerceB2B eCommerce
B2B eCommerce
 
Scalability problems and E-business
Scalability problems and E-businessScalability problems and E-business
Scalability problems and E-business
 
B2B eCommerce
B2B eCommerceB2B eCommerce
B2B eCommerce
 
E intelligence
E intelligenceE intelligence
E intelligence
 
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
Problems of Contemporary Communication Companies. Ways and Tools for Solving ...
 
Plugin ch12edited-ok
Plugin ch12edited-okPlugin ch12edited-ok
Plugin ch12edited-ok
 
2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures2011 02 08_enabling_ins_agents_e_signatures
2011 02 08_enabling_ins_agents_e_signatures
 
Greening Your IT Mindset
Greening Your IT MindsetGreening Your IT Mindset
Greening Your IT Mindset
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
Application Security Testing - Tycho Schmidt
Application Security Testing  - Tycho SchmidtApplication Security Testing  - Tycho Schmidt
Application Security Testing - Tycho Schmidt
 
The 3 stages of e commerce
The 3 stages of e commerceThe 3 stages of e commerce
The 3 stages of e commerce
 
Intranet & Extranet
Intranet & ExtranetIntranet & Extranet
Intranet & Extranet
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Google ebda2 - eCommerce - Souq.com
Google ebda2 - eCommerce - Souq.comGoogle ebda2 - eCommerce - Souq.com
Google ebda2 - eCommerce - Souq.com
 
PAETEC Solutions Portfolio
PAETEC Solutions PortfolioPAETEC Solutions Portfolio
PAETEC Solutions Portfolio
 
Transaction-based Capacity Planning for greater IT Reliability™ webinar
Transaction-based Capacity Planning for greater IT Reliability™ webinar Transaction-based Capacity Planning for greater IT Reliability™ webinar
Transaction-based Capacity Planning for greater IT Reliability™ webinar
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

E-commerce Technology for Safe money transaction over the net

  • 1. E-commerce Technology for Safe Money Transaction Over the net y Presented and Published b National Conference on Automation in Banks and Financial Institutions 22-23 June 2000 organized by IETE Chandigarh, held at CSIO Chandigarh Presenter Noorjahan Haque Faculty, Information technology Institute of Electronics & Telecommunication Engineers (IETE) Chandigarh Co-Author Raman K. Attri Member IETE / Scientist, Central Scientific Instruments Organization (CSIO) Chandigarh Copyrights © 2000 Neeru Haque / R. K. Attri
  • 2. Agenda Evolution of E-commerce features of E-Commerce Technology behind E-com Money Safety issues and measures Copyrights © 2000 Neeru Haque / R. K. Attri
  • 3. Meaning of E-commerce E commerce E-commerce stands for every kind of money transaction transaction, selling, purchasing or exchange of services or products over the Internet Web shopping is only a small part of the e-commerce picture. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier f i h k h i i for bi big corporations. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 4. Evolution of E-Commerce The e-commerce and e-business has evolved through a set of technological changes coming in picture Internal Computerization in the company (Computerization and internal Networking with no outer world interaction) Electronics Data Interchange with suppliers(Extension of Internal network to suppliers to access company data base) Internet Connectivity to End Users (Extension of End-Users external network to end users) E-commerce Revolution (money transaction, selling y g and purchasing over the internet) Copyrights © 2000 Neeru Haque / R. K. Attri
  • 5. Typical Evolutionary Path of E-Com Too clumsy E-mail usage Sophisticated Company Wide Simple E-mail E-mail System E-mail Need employee info Little return on investment Simple Web ignored Dynamic/interactive Secure info to Sophisticated Static p brochure b h Web it W b site Trading T di partners t Web sites Need to update info Need partner and Difficult to maintain security info Meet internal Demands Basic Internal info Little used Web maintenance Key Internal Back office on Intranet System Database on Internet system linked Improved internal Need back Need product info Customer functionality y office info info Simple On-line Few sales Customers Stock control , Full Catalogue Sales Personalized shipment tracking Want to keep customers Reduced cost improved efficiency Next Generation E-business Copyrights © 2000 Neeru Haque / R. K. Attri
  • 6. Technologies contributing in E-com • Recent advances in telecommunications and computer technologies h h l i have moved computer networks to the center of the d k h f h international economic infrastructure. • Heavy rise in Internet and the World Wide Web has transformed global commerce b f d l b l by f ili i facilitating iinstantaneous, inexpensive contact among sellers, buyers, investors, advertisers and financiers anywhere in the world. • The Th rapidid integration i t ti of f Internet I t t andd other th telecommunications-based functions into nearly every sphere of business has led to an international focus on the New World of e- commerce. commerce Copyrights © 2000 Neeru Haque / R. K. Attri
  • 7. E-commerce Setup Electronic commerce encompasses all business conducted b means of computer networks d d by f k Server ISP Back Office links Internet Back Client ISP Bone PC My LAN Net Total Quality of service Copyrights © 2000 Neeru Haque / R. K. Attri
  • 8. Business Communication: Old Way Company A POST FAX Proprietary Data Comm Company B (EDI/VANs Copyrights © 2000 Neeru Haque / R. K. Attri
  • 9. Challenges in going E-commerce Getting into e-commerce is not as simple as setting up a Web page e commerce with an order form. There are three big internal challenges in "e-enabling" business. All of them have to be overcome to have a complete end-to-end e-business end to end e business running. a)The first is to take your back-office processes online and to automate your workflow b)The second challenge is to make data-sharing possible across disparate applications like your ERP systems, your supplier’s systems, and your e-commerce order-taking systems systems. c) Third is to automate your decision-making process. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 10. Impacts of E-Commerce Electronic business is using innovative technology to build relationships and commerce globally and is the greatest opportunity and/or threat to existing business models The e commerce has changed the way the business is done e-commerce The mode of communication is changing big way both in and outside the company. The old way of correspondence is obsoleting and new way, through internet and intranet are in picture. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 11. Business Communication: Internet Way Internet Server Company A •Web Wb •E-mail etc Company X FAX/Post/point to point (to known location) Company B Copyrights © 2000 Neeru Haque / R. K. Attri
  • 12. Business Communication: Intranet Way Company X Company A Company B Community of Trust FAX/Post/point to point (to known location) Internet Server I S Company X •Web •E-mail etc Copyrights © 2000 Neeru Haque / R. K. Attri
  • 13. Elements of Trustworthy E-commerce Services The i i l l Th principal elements of t t t f trustworthy i th context of on-line th in the t t f li commercial transactions are: • Security: Information transmitted during a transaction will arrive i uncorrupted f i in t d form and will not b i d ill t be improperly l k d t l leaked to others. Privacy: Protection to access and use of personal information obtained as a result of electronic t bt i d lt f l t i transactions. ti Authenticity: Verification that the parties to a transaction, and the services rendered, are truly as represented. Non-repudiability: Assurance that a transaction will be honored as agreed and that each party can prove the validity of the terms of the deal in the court. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 14. E-commerce Security Issues Security is the biggest issue of E commerce E-commerce. Secure e-commerce transaction has to insure protection of assets and privacy. p y It should give reliable service, audit and accountability and identification procedure Business and government i i i i d institutions must d l develop policies that build greater trust in the new transaction media Copyrights © 2000 Neeru Haque / R. K. Attri
  • 15. E-commerce Security Technologies (To be used in combination to ensure security) Encryption (coding of messages) Cryptography (data transmission security by encryption of contents of message) f t t f ) Digital Signature (To prove that it's really genuine user - Its really me!) ts ea y e!) Digital Certificate (user authentic identity-who am I?) Firewall ( network and traffic watch to avoid unauthorized access of the network resources) Copyrights © 2000 Neeru Haque / R. K. Attri
  • 16. Encryption Coding the transmitted message or credit card number with the help of some algorithm and a encryption key. Encryption provide security in highly-networked environment Applications include protecting files from theft or unauthorized access, keeping communications secure from interception, and facilitating secure transactions Highly secure encryption can be deployed fairly cheaply 2.0 versions of Netscape Navigator and Microsoft Internet Explorer facilitate transactions encrypted using Secure Sockets Layer (SSL), a protocol that creates a secure connection to the server, protecting the information as it travels over the Internet When Web site is secured by SSL, the URL begins with https instead of http. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 17. Cryptography Encrypting the contents with one key and decrypting with another key. One is called private key and other is called public key. The message encrypted using receiver's public key can be decrypted only by receiver's private key It is used to guarantee integrity (i.e. that the contents of a file or message have not been altered) to establish the altered), identity of a party, or to make legal commitments. The strong crypto-system are now available which use different algorithms like DES, IDEA and RSA Copyrights © 2000 Neeru Haque / R. K. Attri
  • 18. Digital Signature Now in e-commerce the issue that how one know that it is really me? Evolving a digital signature does it. The digital signature is kind of message, known to me only and representing me. It is encrypted using my private key and anyone can decrypt it using my public key. The reception end, i i proved h I h h i d it is d hat have encoded the d d h message and signed it. This technology makes the basis for the electronics cash. This is also the basis for user authentication and non-repudiation. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 19. Digital Certificate Just signing on my messages is not enough A identity enough. has to be assigned to the fellow using the e-commerce services. It reflects who am I? This is digital signature. These digital certificates are issued by some trusted third party. A di it l registry of all di it l certificate h ld digital i t f ll digital tifi t holders i is made. The client negotiates with the registry before doing g g y g business with the server. Severs have the user's signature Copyrights © 2000 Neeru Haque / R. K. Attri
  • 20. FireWall The firewalls are basically a software or set of protocols which isolate the networks and the traffics The fireball have following three objectives: -It keeps out external threats like virus and unauthorized access from external person. -it pre ent internal sensiti e data to be transmitted it prevent sensitive outside without authorization. -It prevent internal attacks p Firewalls itself are not full proof security techniques Copyrights © 2000 Neeru Haque / R. K. Attri
  • 21. Safe Money Transaction Technologies Credit Cards (for purchasing at Point of sale counter using card p g g reader and web based on-line transaction on credit. Instant validation of account and deduction after the sale) Smart Card Digital Currency (In form of smart card for all kinds of payments an on the instant deduction of money from the account) Electronics Ch El i Cheques (pre-issued software modules each representing certain cash value, to be exchanged over the internet in place of any money or smart card number) Hybrid Mode (includes major and minor payment by smart card, coins, cheques etc--all in one) Copyrights © 2000 Neeru Haque / R. K. Attri
  • 22. Credit Card Internationally accepted mode of payment in two forms Credit card at Point of Sale Counter (POS terminal reads the card details and verify it over phone lines from the acquiring bank and credit card issuing bank) Web Based Online-Credit Card Payment System (validation over the net through servers) SET protocol encodes the credit card numbers on vendors' servers so that only banks and credit card companies can read it The disadvantages of the credit card is that a third party approval like bank and its fees is involved Copyrights © 2000 Neeru Haque / R. K. Attri
  • 23. Digital Currency This is basically two mode meant both for major and micro-payments : a smart card technology digital coins The smart card reader reads the smart card inserted in the smart card reader hardware cartridge and sends the account information from the card to the the issuing bank over the internet and after validation the amount being paid online is deducted form the account of the person's gp p account. One more option is digital coins in form of software modules having unique identification number and particular amount. Can be submitted q p over the net for purchasing. Retailer can further use it for his own purpose and recycle it Copyrights © 2000 Neeru Haque / R. K. Attri
  • 24. Electronics Cheques These are pre-issued cards replacing cheque Each pre issued cheque. card module represent some predefined cash amount. It is to be submitted where purchasing is being done. No need of validation and third party involvement unlike credit card transactions. Cheaper as third part fees is not in ol ed party involved. Since the cheques are generally used in public, this mode of money transaction is expected to be quite y p q popular. Copyrights © 2000 Neeru Haque / R. K. Attri
  • 25. Hybrid Mode -Cybercash The Cybercash i getting wide popularity among the world Th C b h is i id l i h ld leader banks, merchants and users globally. The cybercash interface with many leading financial institutions. y g It facilitate hybrid mode of payment which include credit card payment system working on SET protocols and Cybercoin system f payment f C b i t for t from $0 25 t $10 $0.25 to $10. It also support electronics cheques providing pay now facility for interactive billing applications. y g pp Copyrights © 2000 Neeru Haque / R. K. Attri
  • 26. The arena of E-business E-Business is the powerful business environment that is created when critical business systems are connected directly to customers, employees, vendors, and business partners using intranets, extranets, E-Commerce E Commerce technologies, collaborative applications, and the Web. Developing E-Business successfully means building reliable, scalable systems f li bl l bl for security, collaboration, i ll b i messaging, E-Commerce payments, supply-chain management, sales force, data warehousing, and customer g , , g, relations - and integrating all of this with existing back-end operations Copyrights © 2000 Neeru Haque / R. K. Attri
  • 27. About the author Noor Jahan Haque earned her Masters in Information technology in 1999. She served at IETE as associate faculty from 2000-2001. neeruhaque2000@yahoo.com q y Raman K. Attri, Masters in Technology (Applied Electronics) served as senior scientist at CSIO Chandigarh from 1995-2005. His 1995 2005. specialization is in Instrumentation systems. rkattri@rediffmail.com Copyrights © 2000 Neeru Haque / R. K. Attri