SlideShare una empresa de Scribd logo
1 de 28
Copyright © Terry Felke-Morris
WEB DEVELOPMENT & DESIGN
FOUNDATIONS WITH HTML5
Chapter 12
Key Concepts
1Copyright © Terry Felke-Morris
Copyright © Terry Felke-Morris
LEARNING OUTCOMES
 In this chapter, you will learn how to
 define e-commerce
 identify benefits and risks of e-commerce
 describe e-commerce business models
 describe e-commerce security and encryption
 define Electronic Data Interchange (EDI)
 identify trends and projections for e-commerce
 describe issues related to e-commerce
 describe options for order and payment processing
2
Copyright © Terry Felke-Morris
WHAT IS E-COMMERCE?
The integration of communications, data
management, and security technologies to
allow individuals and organizations to
exchange information related to the sale of
goods and services.
Major functions of E-Commerce include:
◦ the buying of goods,
◦ the selling of goods, and
◦ performance of financial transactions on the
Internet.
3
Copyright © Terry Felke-Morris
E-COMMERCE ADVANTAGES FOR BUSINESSES
 Reduced Costs
 Increased Customer Satisfaction
 More Effective Data Management
 Potentially Higher Sales
4
Copyright © Terry Felke-Morris
E-COMMERCE ADVANTAGES FOR CONSUMERS
 Convenience
 Easier Comparison Shopping
 Wider Selection of Goods
5
Copyright © Terry Felke-Morris
E-COMMERCE RISKS FOR BUSINESSES
 Need for a robust, reliable web site
 Fraudulent transactions
 Customer reluctance to purchase
online
 Increased competition
6
Copyright © Terry Felke-Morris
E-COMMERCE RISKS FOR CONSUMERS
 Possible Security Issues
 Possible Privacy Issues
 Purchasing from photos & descriptions
 Possible difficulty with returns
7
Copyright © Terry Felke-Morris
E-COMMERCE
BUSINESS MODELS
 B2C – Business-to-Consumer
 B2B – Business-to-Business
 C2C – Consumer-to-Consumer
 B2G – Business-to-Government
8
Copyright © Terry Felke-Morris
ELECTRONIC DATA INTERCHANGE (EDI)
 The transfer of data between different companies using networks.
 Facilitates the exchange of standard business documents including
purchase orders and invoices
 EDI is not new
 In existence since the 1960s
 Trading Partners
 Organizations that exchange EDI transmissions
 Newer technologies
 XML andWeb Services are replacing traditional EDI
 Provide opportunities to customize secure information exchange over the
Internet
9
Copyright © Terry Felke-Morris
E-COMMERCE U.S. RETAIL SALES
What do people buy online?
http://www.census.gov/compendia/statab/tables/09s1016.xls
10
1. Clothing, accessories, and footwear ($17 billion)
2. Computer hardware and software ($14.3 billion)
3. Electronics and appliances ($13 billion)
4. Furniture and home furnishings ($9.8 billion)
5. Books, music, and videos ($9 billion)
6. Office equipment and supplies ($5.8 billion)
7. Drugs, health aids, and beauty aids ($5.5 billion)
8. Sporting goods ($3.9 billion)
9. Toys, hobby goods, and games ($3.3 billion)
10. Food, beer, and wine ($2.3 billion)
2008 Sales Figures
http://www.census.gov/compendia/statab/2011/tables/11s1055.xls
Copyright © Terry Felke-Morris
WHO’S ON
THE INTERNET?
 Source:
http://www.pewinternet.org/
Static-Pages/Trend-
Data/Whos-Online.aspx
 Other Demographics:
◦ http://www.pewinternet.org/
◦ http://www.clickz.com
◦ http://www.census.gov/eos/ww
Category Percentage That
Use the Internet
Men 78%
Women 76%
Age: 18-29 90%
Age: 30-49 84%
Age: 50-64 76%
Age: Over 65 46%
Household Income: Less than $30,000 63%
Household Income: $30,000 to $49,999 79%
Household Income: $50,000 to $74,999 92%
Household Income: $75,000 or higher 96%
Education: High school graduate 69%
Education: Some college 89%
Education: College graduate 93%
11
Copyright © Terry Felke-Morris
E-COMMERCE ISSUES
 Intellectual Property
 Security
 Fraud
 Taxation
 International Commerce
12
Copyright © Terry Felke-Morris
E-COMMERCE SECURITY
Encryption
◦ Ensures privacy within an organization and on the Internet.
◦ The conversion of data into an unreadable form, called a
ciphertext.
Decryption
◦ The process of converting the ciphertext back into its
original form, called plaintext or cleartext, so it can be
understood.
The encryption/decryption process requires an
algorithm and a key.
13
Copyright © Terry Felke-Morris
E-COMMERCE SECURITY
ENCRYPTION TYPES
Secure E-Commerce transactions use the
encryption technologies below:
 Symmetric-key Encryption
 Asymmetric-key Encryption
 Hash Encryption
SSL (Secure Sockets Layer)
 Utilizes these encryption technologies
 Provides for secure transmission of data on the
Internet.
14
Copyright © Terry Felke-Morris
E-COMMERCE SECURITY: SYMMETRIC-KEY
Symmetric-Key Encryption
Also called single-key encryption
Both encryption and decryption
use the same key
Both the sender and receiver must
know the key before
communicating using encryption.
Advantage: speed
15
Copyright © Terry Felke-Morris
E-COMMERCE SECURITY: ASYMMETRIC-KEY
Asymmetric-Key Encryption
Also called public-key encryption
There is no shared secret
Two keys are
created at the same time:
◦ Public key
◦ Private key
◦ Asymmetric-key encryption
is much slower than
symmetric-key encryption.
16
Copyright © Terry Felke-Morris
E-COMMERCE SECURITY: HASH
Hash Encryption
 A hash algorithm transforms a string of characters into a
“digest”
 A shorter fixed-length value or key that represents the original
string
 One-way encryption
 Used for information that will not be read or decrypted
 Purpose: verify the integrity of information
17
Copyright © Terry Felke-Morris
SECURE SOCKETS LAYER (SSL)
 A protocol that allows data to be privately exchanged over
public networks
 Developed by Netscape
 Encrypts data sent between a client (usually a Web browser)
and a Web server.
 Utilizes both symmetric and asymmetric keys.
 “https” protocol
 Browsers display a “lock” icon
18
Copyright © Terry Felke-Morris
SECURE SOCKETS LAYER (SSL)
 SSL provides secure communication between a client and
server by using:
 Server and (optionally) client digital certificates for authentication
 Symmetric-key cryptography using a "session key" for bulk encryption
 Public-key cryptography for transfer of the session key
 Message Digests (hash encryption) to verify the integrity of the
transmission
19
Copyright © Terry Felke-Morris
SSL & DIGITAL CERTIFICATE
Digital Certificate
◦ A form of an asymmetric key
 Also contains information about the certificate, the
holder of the certificate, and the issuer of the certificate.
◦ Used by SSL to authenticate the
identity of the web server
20
Copyright © Terry Felke-Morris
DIGITAL CERTIFICATE
The contents of a digital
certificate include:
◦ The public key
◦ Effective date of the certificate
◦ Expiration date of the certificate
◦ Details about the Certificate
Authority -- the issuer of the
certificate
◦ Details about the certificate
holder
◦ A digest of the certificate content
21
Copyright © Terry Felke-Morris
CERTIFICATE AUTHORITY
A trusted third-party organization or company
that issued digital certificates.
Well-known Certificate Authorities:
Verisign
http://www.verisign.com
Thawte
http://www.thawte.com
22
Copyright © Terry Felke-Morris
OBTAINING A DIGITAL CERTIFICATE
Request a certificate from a Certificate Authority
and pay the application fee.
The Certificate Authority:
◦ verifies your identity,
◦ issues your Certificate,
◦ and supplies you with a public/private key pair.
Store the certificate in your software - such as a
web server, web browser, or e-mail application.
The Certificate Authority makes your certificate
publicly known.
23
Copyright © Terry Felke-Morris
CHECKPOINT
1. Describe three advantages of e-commerce
for an entrepreneur just starting a business.
2. Describe three risks that businesses face
when engaging in e-commerce.
3. Define SSL. Describe how an online
shopper can tell that an e-commerce site is
using SSL.
24
Copyright © Terry Felke-Morris
ORDER & PAYMENT PROCESSING
 E-Commerce Payment Models:
 Cash
 Check
 Credit
 Smart Card
 Mobile Payment
25
Copyright © Terry Felke-Morris
E-COMMERCE STOREFRONT SOLUTIONS
Instant Online Storefront
◦ Yahoo!, Earthstores, Shopify, BigCommerce
Off-The-Shelf Shopping Cart Software
◦ Agoracart, osCommerce, ZenCart, Mercantec Softcart
Custom Built Solution
◦ IBM's WebSphere Commerce Suite, Microsoft's Commerce
Server
◦ Visual Studio.NET, Adobe Dreamweaver
Semi-Custom Built Solutions on a Budget
 E-Commerce add-ons for Dreamweaver
 Paypal order processing
 Google Checkout
 Free shopping cart scripts
26
Copyright © Terry Felke-Morris
CHECKPOINT
1. List three payment models commonly used on the Web.
Which one is the most popular, why?
2. Have you purchased online? If so, think of the last item
that you purchased.
a. Why did you purchase it online instead of at a store?
b. Did you check to see if the transaction was secure? Why or why
not?
c. How will your shopping habits be different in the future?
3. Describe three types of e-commerce solutions available.
Which provides the easiest entry to e-commerce? Explain.4.
27
Copyright © Terry Felke-Morris
SUMMARY
This chapter introduced you to basic e-
commerce concepts and implementations.
Consider taking an E-Commerce course in
the future to continue your study of this
dynamic and growing area of web
development.
28

Más contenido relacionado

La actualidad más candente

Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
101 Blockchains
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
101 Blockchains
 
BizDay: B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...
BizDay:  B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...BizDay:  B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...
BizDay: B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...
R3
 
Blockchain in Finance
Blockchain in FinanceBlockchain in Finance
Blockchain in Finance
101 Blockchains
 

La actualidad más candente (20)

Ethereum Smart contracts - Blockchain App Factory
Ethereum Smart contracts - Blockchain App FactoryEthereum Smart contracts - Blockchain App Factory
Ethereum Smart contracts - Blockchain App Factory
 
Demystifying Smart Contracts
Demystifying Smart ContractsDemystifying Smart Contracts
Demystifying Smart Contracts
 
Everything Blockchain Presentation - June 2021
 Everything Blockchain Presentation - June 2021 Everything Blockchain Presentation - June 2021
Everything Blockchain Presentation - June 2021
 
Quick Guide to Blockchain Smart Contracts
Quick Guide to Blockchain Smart ContractsQuick Guide to Blockchain Smart Contracts
Quick Guide to Blockchain Smart Contracts
 
Blockchain Digital Transformation Presentation
Blockchain Digital Transformation PresentationBlockchain Digital Transformation Presentation
Blockchain Digital Transformation Presentation
 
The Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication JourneysThe Road to Intelligent Authentication Journeys
The Road to Intelligent Authentication Journeys
 
Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021Fintech & blockchain technology 06.12.2021
Fintech & blockchain technology 06.12.2021
 
List of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain TechnologyList of Top 50 Companies Using Blockchain Technology
List of Top 50 Companies Using Blockchain Technology
 
BizDay: B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...
BizDay:  B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...BizDay:  B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...
BizDay: B3i: A Real Blockchain Solution for a Real Business Problem, Sylvain...
 
Blockchaindev #1 - Ethereum Smart Contracts 101
Blockchaindev #1 - Ethereum Smart Contracts 101Blockchaindev #1 - Ethereum Smart Contracts 101
Blockchaindev #1 - Ethereum Smart Contracts 101
 
Blockchain in human resource
Blockchain in human resourceBlockchain in human resource
Blockchain in human resource
 
Blockchain Solutions for HR
Blockchain Solutions for HRBlockchain Solutions for HR
Blockchain Solutions for HR
 
Enterprise Blockchain
Enterprise BlockchainEnterprise Blockchain
Enterprise Blockchain
 
Blockchain Overview
Blockchain OverviewBlockchain Overview
Blockchain Overview
 
Brafton White Paper Example
Brafton White Paper ExampleBrafton White Paper Example
Brafton White Paper Example
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
Business2Blockchain | Strengthen Your Business by Securing it on a Blockchain
Business2Blockchain | Strengthen Your Business by Securing it on a BlockchainBusiness2Blockchain | Strengthen Your Business by Securing it on a Blockchain
Business2Blockchain | Strengthen Your Business by Securing it on a Blockchain
 
Blockchain in Finance
Blockchain in FinanceBlockchain in Finance
Blockchain in Finance
 
Reducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
 
5 blockchain implementation strategy for business
5 blockchain implementation strategy for business5 blockchain implementation strategy for business
5 blockchain implementation strategy for business
 

Destacado (6)

Chapter 13 - Web Design
Chapter 13 - Web DesignChapter 13 - Web Design
Chapter 13 - Web Design
 
Chapter 9 - Web Design
Chapter 9 - Web DesignChapter 9 - Web Design
Chapter 9 - Web Design
 
Chapter 10 - Web Design
Chapter 10 - Web DesignChapter 10 - Web Design
Chapter 10 - Web Design
 
Chapter 7 - Web Design
Chapter 7 - Web DesignChapter 7 - Web Design
Chapter 7 - Web Design
 
Chapter 14 - Web Design
Chapter 14 - Web DesignChapter 14 - Web Design
Chapter 14 - Web Design
 
103學測 原始分數與級分對照表
103學測 原始分數與級分對照表103學測 原始分數與級分對照表
103學測 原始分數與級分對照表
 

Similar a Chapter 12 - Web Design

E Commerce
E CommerceE Commerce
E Commerce
jroloff
 
Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003
Oi Kwok Yang
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
ecommerce
 

Similar a Chapter 12 - Web Design (20)

Chapter12
Chapter12Chapter12
Chapter12
 
Introduction to E-Commerce.pdf
Introduction to E-Commerce.pdfIntroduction to E-Commerce.pdf
Introduction to E-Commerce.pdf
 
E Commerce
E CommerceE Commerce
E Commerce
 
E Com
E ComE Com
E Com
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003Itb Lecture 6 Mel 2003
Itb Lecture 6 Mel 2003
 
Ecommerce(3)
Ecommerce(3)Ecommerce(3)
Ecommerce(3)
 
Ch12(revised 20071226)
Ch12(revised 20071226)Ch12(revised 20071226)
Ch12(revised 20071226)
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL CertificateA Complete RapidSSL Guide on Securing Online Business with SSL Certificate
A Complete RapidSSL Guide on Securing Online Business with SSL Certificate
 
Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104Lotusphere 2011 SHOW104
Lotusphere 2011 SHOW104
 
INTRODUCTION TO ECOMMERCE
INTRODUCTION TO ECOMMERCE   INTRODUCTION TO ECOMMERCE
INTRODUCTION TO ECOMMERCE
 
Symantec SSL Explained
Symantec SSL ExplainedSymantec SSL Explained
Symantec SSL Explained
 
E commerce
E commerceE commerce
E commerce
 
Data Security Whitepaper
Data Security WhitepaperData Security Whitepaper
Data Security Whitepaper
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Ecommerce
EcommerceEcommerce
Ecommerce
 

Más de tclanton4 (20)

Chapter 11 - Web Design
Chapter 11 - Web DesignChapter 11 - Web Design
Chapter 11 - Web Design
 
Chapter 8 - Web Design
Chapter 8 - Web DesignChapter 8 - Web Design
Chapter 8 - Web Design
 
Chapter 6 - Web Design
Chapter 6 - Web DesignChapter 6 - Web Design
Chapter 6 - Web Design
 
Chapter 5 - Web Design
Chapter 5 - Web DesignChapter 5 - Web Design
Chapter 5 - Web Design
 
Chapter 4 - Web Design
Chapter 4 - Web DesignChapter 4 - Web Design
Chapter 4 - Web Design
 
Chapter 3 - Web Design
Chapter 3 - Web DesignChapter 3 - Web Design
Chapter 3 - Web Design
 
Chapter 1 - Web Design
Chapter 1 - Web DesignChapter 1 - Web Design
Chapter 1 - Web Design
 
Base2
Base2Base2
Base2
 
Base1
Base1Base1
Base1
 
Impress
ImpressImpress
Impress
 
Project Mgt
Project MgtProject Mgt
Project Mgt
 
Charts in Calc
Charts in CalcCharts in Calc
Charts in Calc
 
Formatting a Worksheet in Calc
Formatting a Worksheet in CalcFormatting a Worksheet in Calc
Formatting a Worksheet in Calc
 
Creating a Worksheet in Calc
Creating a Worksheet in CalcCreating a Worksheet in Calc
Creating a Worksheet in Calc
 
Advanced Features of Writer
Advanced Features of WriterAdvanced Features of Writer
Advanced Features of Writer
 
Creating a Writer Document
Creating a Writer DocumentCreating a Writer Document
Creating a Writer Document
 
Formatting Features of Writer
Formatting Features of WriterFormatting Features of Writer
Formatting Features of Writer
 
Getting Started - The Basics
Getting Started - The BasicsGetting Started - The Basics
Getting Started - The Basics
 
Intro to Information Systems
Intro to Information SystemsIntro to Information Systems
Intro to Information Systems
 
Unit 04 PowerPoint (WebA)
Unit 04 PowerPoint (WebA)Unit 04 PowerPoint (WebA)
Unit 04 PowerPoint (WebA)
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 

Chapter 12 - Web Design

  • 1. Copyright © Terry Felke-Morris WEB DEVELOPMENT & DESIGN FOUNDATIONS WITH HTML5 Chapter 12 Key Concepts 1Copyright © Terry Felke-Morris
  • 2. Copyright © Terry Felke-Morris LEARNING OUTCOMES  In this chapter, you will learn how to  define e-commerce  identify benefits and risks of e-commerce  describe e-commerce business models  describe e-commerce security and encryption  define Electronic Data Interchange (EDI)  identify trends and projections for e-commerce  describe issues related to e-commerce  describe options for order and payment processing 2
  • 3. Copyright © Terry Felke-Morris WHAT IS E-COMMERCE? The integration of communications, data management, and security technologies to allow individuals and organizations to exchange information related to the sale of goods and services. Major functions of E-Commerce include: ◦ the buying of goods, ◦ the selling of goods, and ◦ performance of financial transactions on the Internet. 3
  • 4. Copyright © Terry Felke-Morris E-COMMERCE ADVANTAGES FOR BUSINESSES  Reduced Costs  Increased Customer Satisfaction  More Effective Data Management  Potentially Higher Sales 4
  • 5. Copyright © Terry Felke-Morris E-COMMERCE ADVANTAGES FOR CONSUMERS  Convenience  Easier Comparison Shopping  Wider Selection of Goods 5
  • 6. Copyright © Terry Felke-Morris E-COMMERCE RISKS FOR BUSINESSES  Need for a robust, reliable web site  Fraudulent transactions  Customer reluctance to purchase online  Increased competition 6
  • 7. Copyright © Terry Felke-Morris E-COMMERCE RISKS FOR CONSUMERS  Possible Security Issues  Possible Privacy Issues  Purchasing from photos & descriptions  Possible difficulty with returns 7
  • 8. Copyright © Terry Felke-Morris E-COMMERCE BUSINESS MODELS  B2C – Business-to-Consumer  B2B – Business-to-Business  C2C – Consumer-to-Consumer  B2G – Business-to-Government 8
  • 9. Copyright © Terry Felke-Morris ELECTRONIC DATA INTERCHANGE (EDI)  The transfer of data between different companies using networks.  Facilitates the exchange of standard business documents including purchase orders and invoices  EDI is not new  In existence since the 1960s  Trading Partners  Organizations that exchange EDI transmissions  Newer technologies  XML andWeb Services are replacing traditional EDI  Provide opportunities to customize secure information exchange over the Internet 9
  • 10. Copyright © Terry Felke-Morris E-COMMERCE U.S. RETAIL SALES What do people buy online? http://www.census.gov/compendia/statab/tables/09s1016.xls 10 1. Clothing, accessories, and footwear ($17 billion) 2. Computer hardware and software ($14.3 billion) 3. Electronics and appliances ($13 billion) 4. Furniture and home furnishings ($9.8 billion) 5. Books, music, and videos ($9 billion) 6. Office equipment and supplies ($5.8 billion) 7. Drugs, health aids, and beauty aids ($5.5 billion) 8. Sporting goods ($3.9 billion) 9. Toys, hobby goods, and games ($3.3 billion) 10. Food, beer, and wine ($2.3 billion) 2008 Sales Figures http://www.census.gov/compendia/statab/2011/tables/11s1055.xls
  • 11. Copyright © Terry Felke-Morris WHO’S ON THE INTERNET?  Source: http://www.pewinternet.org/ Static-Pages/Trend- Data/Whos-Online.aspx  Other Demographics: ◦ http://www.pewinternet.org/ ◦ http://www.clickz.com ◦ http://www.census.gov/eos/ww Category Percentage That Use the Internet Men 78% Women 76% Age: 18-29 90% Age: 30-49 84% Age: 50-64 76% Age: Over 65 46% Household Income: Less than $30,000 63% Household Income: $30,000 to $49,999 79% Household Income: $50,000 to $74,999 92% Household Income: $75,000 or higher 96% Education: High school graduate 69% Education: Some college 89% Education: College graduate 93% 11
  • 12. Copyright © Terry Felke-Morris E-COMMERCE ISSUES  Intellectual Property  Security  Fraud  Taxation  International Commerce 12
  • 13. Copyright © Terry Felke-Morris E-COMMERCE SECURITY Encryption ◦ Ensures privacy within an organization and on the Internet. ◦ The conversion of data into an unreadable form, called a ciphertext. Decryption ◦ The process of converting the ciphertext back into its original form, called plaintext or cleartext, so it can be understood. The encryption/decryption process requires an algorithm and a key. 13
  • 14. Copyright © Terry Felke-Morris E-COMMERCE SECURITY ENCRYPTION TYPES Secure E-Commerce transactions use the encryption technologies below:  Symmetric-key Encryption  Asymmetric-key Encryption  Hash Encryption SSL (Secure Sockets Layer)  Utilizes these encryption technologies  Provides for secure transmission of data on the Internet. 14
  • 15. Copyright © Terry Felke-Morris E-COMMERCE SECURITY: SYMMETRIC-KEY Symmetric-Key Encryption Also called single-key encryption Both encryption and decryption use the same key Both the sender and receiver must know the key before communicating using encryption. Advantage: speed 15
  • 16. Copyright © Terry Felke-Morris E-COMMERCE SECURITY: ASYMMETRIC-KEY Asymmetric-Key Encryption Also called public-key encryption There is no shared secret Two keys are created at the same time: ◦ Public key ◦ Private key ◦ Asymmetric-key encryption is much slower than symmetric-key encryption. 16
  • 17. Copyright © Terry Felke-Morris E-COMMERCE SECURITY: HASH Hash Encryption  A hash algorithm transforms a string of characters into a “digest”  A shorter fixed-length value or key that represents the original string  One-way encryption  Used for information that will not be read or decrypted  Purpose: verify the integrity of information 17
  • 18. Copyright © Terry Felke-Morris SECURE SOCKETS LAYER (SSL)  A protocol that allows data to be privately exchanged over public networks  Developed by Netscape  Encrypts data sent between a client (usually a Web browser) and a Web server.  Utilizes both symmetric and asymmetric keys.  “https” protocol  Browsers display a “lock” icon 18
  • 19. Copyright © Terry Felke-Morris SECURE SOCKETS LAYER (SSL)  SSL provides secure communication between a client and server by using:  Server and (optionally) client digital certificates for authentication  Symmetric-key cryptography using a "session key" for bulk encryption  Public-key cryptography for transfer of the session key  Message Digests (hash encryption) to verify the integrity of the transmission 19
  • 20. Copyright © Terry Felke-Morris SSL & DIGITAL CERTIFICATE Digital Certificate ◦ A form of an asymmetric key  Also contains information about the certificate, the holder of the certificate, and the issuer of the certificate. ◦ Used by SSL to authenticate the identity of the web server 20
  • 21. Copyright © Terry Felke-Morris DIGITAL CERTIFICATE The contents of a digital certificate include: ◦ The public key ◦ Effective date of the certificate ◦ Expiration date of the certificate ◦ Details about the Certificate Authority -- the issuer of the certificate ◦ Details about the certificate holder ◦ A digest of the certificate content 21
  • 22. Copyright © Terry Felke-Morris CERTIFICATE AUTHORITY A trusted third-party organization or company that issued digital certificates. Well-known Certificate Authorities: Verisign http://www.verisign.com Thawte http://www.thawte.com 22
  • 23. Copyright © Terry Felke-Morris OBTAINING A DIGITAL CERTIFICATE Request a certificate from a Certificate Authority and pay the application fee. The Certificate Authority: ◦ verifies your identity, ◦ issues your Certificate, ◦ and supplies you with a public/private key pair. Store the certificate in your software - such as a web server, web browser, or e-mail application. The Certificate Authority makes your certificate publicly known. 23
  • 24. Copyright © Terry Felke-Morris CHECKPOINT 1. Describe three advantages of e-commerce for an entrepreneur just starting a business. 2. Describe three risks that businesses face when engaging in e-commerce. 3. Define SSL. Describe how an online shopper can tell that an e-commerce site is using SSL. 24
  • 25. Copyright © Terry Felke-Morris ORDER & PAYMENT PROCESSING  E-Commerce Payment Models:  Cash  Check  Credit  Smart Card  Mobile Payment 25
  • 26. Copyright © Terry Felke-Morris E-COMMERCE STOREFRONT SOLUTIONS Instant Online Storefront ◦ Yahoo!, Earthstores, Shopify, BigCommerce Off-The-Shelf Shopping Cart Software ◦ Agoracart, osCommerce, ZenCart, Mercantec Softcart Custom Built Solution ◦ IBM's WebSphere Commerce Suite, Microsoft's Commerce Server ◦ Visual Studio.NET, Adobe Dreamweaver Semi-Custom Built Solutions on a Budget  E-Commerce add-ons for Dreamweaver  Paypal order processing  Google Checkout  Free shopping cart scripts 26
  • 27. Copyright © Terry Felke-Morris CHECKPOINT 1. List three payment models commonly used on the Web. Which one is the most popular, why? 2. Have you purchased online? If so, think of the last item that you purchased. a. Why did you purchase it online instead of at a store? b. Did you check to see if the transaction was secure? Why or why not? c. How will your shopping habits be different in the future? 3. Describe three types of e-commerce solutions available. Which provides the easiest entry to e-commerce? Explain.4. 27
  • 28. Copyright © Terry Felke-Morris SUMMARY This chapter introduced you to basic e- commerce concepts and implementations. Consider taking an E-Commerce course in the future to continue your study of this dynamic and growing area of web development. 28