Professional Documents
Culture Documents
3.2 E-Business & E-Commerce
3.2 E-Business & E-Commerce
3.2 E-Business & E-Commerce
Outline
38.1 38.2 Introduction e-BusinessModels 38.2.1 StorefrontModel 38.2.2 Shopping-CartTechnology 38.2.3 AuctionModel 38.2.4 PortalModel 38.2.5 Name-Your-PriceModel 38.2.6 Comparison-PricingModel 38.2.7 BarteringModel Buildingane-Business e-Marketing 38.4.1 Branding 38.4.2 MarketingResearch 38.4.3 e-MailMarketing
38.3 38.4
38.5
38.7
XMLande-Commerce IntroductiontoWirelessTechnologyandm-Business m-Business IdentifyingUserLocation 38.11.1 E911Act 38.11.2 Location-IdentificationTechnologies WirelessMarketing,AdvertisingandPromotions WirelessPaymentOptions PrivacyandtheWirelessInternet WebResources
E-business
All aspects of e-commerce, plus internal operations of doing business
2004 Prentice Hall, Inc. All rights reserved.
38.2e-BusinessModels e-business
Expansion of old technologies and techniques
Electronic Funds Transfers, for example
Products organized into catalogs that users can browse and search
10
Site is searchable to allow easy location of desired items Site receives a commission on each sale Model also employed in business-to-business transactions www.eBay.com is the leading auction site
11
38.2.3AuctionModel
Fig. 38.1 eBay home page. (These materials have been reproduced with the permission of eBay Inc. COPYRIGHT EBAY INC. ALL RIGHTS RESERVED.)
12
38.2.3AuctionModel
Fig. 38.2 Placing a bid on eBay. (These materials have been reproduced with the permission of eBay Inc. COPYRIGHT EBAY INC. ALL RIGHTS RESERVED.)
13
Horizontal portals
Search engines Aggregate information on broad range of topics
Vertical portals
Information on narrow range of topics
14
15
Can employ search-engine technology to automatically seek out best prices or related products
16
17
e-Business templates
Outline business structure Design details left open to owner
18
19
38.4.1Branding Brand
Name, logo or symbol that defines companys products or services
Unique Recognizable Easy to remember
Brand equity
Value of the brand Customer perception and loyalty
Companies with existing brand may more easily establish their brand on the Internet
New companies must work to establish trust in their brand
20
21
Psychographics
Lifestyles, backgrounds, values
22
23
24
38.4.4Promotions Promotions
Attract visitors Encourage purchasing Increase brand loyalty Should not be only reason people purchase from your company
Sign of weak product or brand
25
26
27
38.4.6ElectronicAdvertising Advertising
Establish and strengthen branding Publish URL in all advertising
28
29
30
31
Increases exposure and number of site visits Amazon.com has large, successful affiliate program
32
33
eCRM, iCRM
Refer to CRM conduced via Internet, interchangeable terms
34
35
36
Some customers have security and privacy concerns Require merchant account at bank
Special card-not-present (CNP) account for online transactions
37
e-Wallets
Store billing and shipping information Fill out forms at compatible sites in one click
38
38.5.3Micropayments Micropayments
Merchants often charged fee for credit card transactions
For small items, fee can exceed cost of item
39
Microprocessor cards
Like tiny computers Can do processing in addition to storing data
Contact interface
Card inserted into reading device for use
Contactless interface
Data transmitted via wireless device inside card
40
Attackers attempt to steal, corrupt or otherwise compromise this data Requirements for successful secure transaction:
Privacy Integrity Authentication Authorization Non-repudiation
41
38.6.1Public-KeyCryptography Cryptography
Transforms data using cipher or cryptostream Key acts as password that combined with cipher will decrypt encoded message into original message Early cryptography relied on symmetric cryptography
Same key used to encrypt and decrypt Problem of how to securely transmit key itself arose
42
38.6.1Public-KeyCryptography
Fig. 38.3 Encrypting and decrypting a message using public-key cryptography.
43
44
38.6.1Public-KeyCryptography
Fig. 38.4 Authentication with a public-key algorithm.
45
Certificate repositories
Hold database of public digital certificates
46
47
Cryptanalytic attacks
Common attack searches for relationship between ciphertext and key Easier when all or part of decoded message known in advance
Goal not to determine original message, but to discover key Allows attacker to forge messages from that sender
48
49
Key-agreement protocol
Protocol is set of rules for communication Digital envelope most common
Encrypt message using secret key Encrypt secret key with public-key encryption Both encrypted portions sent to receiver Receiver decrypts secret key using private key Receiver then uses decrypted secret key to decrypt message
50
38.6.3Key-AgreementProtocols
Fig. 38.5 Creating a digital envelope.
51
52
53
54
38.6.5SecureSocketsLayer(SSL) SSL
Layer on top of TCP/IP Implements public-key encryption using RSA algorithm Generates secret key referred to as session key
Rest of transaction encrypted using this key
Messages still sent through TCP/IP after encryption step Generally used for point-to-point connections
One computer communicating with another directly
55
Stored data should be encrypted by another means Always take standard precautions against cracker attacks
56
Provides authentication, integrity, privacy and denial-of-service protection Encrypts data sent between WAP device and WAP gateway
Where wireless network connects to wired network
57
58
Often employs RSA or Diffie-Hellman encryption for key exchange DES or 3DES used for secret key
IPSec packets
Three components
59
VPN shortcomings
Time consuming and complicated to initially set up Must be careful who is given access
VPN users essentially the same as LAN users Potentially have access to sensitive data
2004 Prentice Hall, Inc. All rights reserved.
60
Viruses
Malicious programs Attach to or overwrite legitimate programs Vary in severity from minor irritations to complete destruction of hard drive data
2004 Prentice Hall, Inc. All rights reserved.
61
62
63
64
65
66
67
38.7.2Defamation Defamation
Consists of slander and libel
Slander is spoken Libel is written or spoken in a broader context than slander
Proving defamation
Plaintiff must:
Show that statement was written, spoken or broadcast Reasonably identify individual responsible Show that the statement is indeed defamatory Show that the statement was intended to cause harm and known to be false Show evidence of injury or actual loss
68
69
Legislation being created to deal with Spam epidemic Software to combat spam also exists Spammers constantly evolve to circumvent new measures One of the toughest usability and privacy issues with Internet today
70
38.7.5CopyrightsandPatents Copyright
Protection given to author of original piece
Protects an expression of idea, not idea itself
71
38.7.5CopyrightsandPatents Patents
Grant creator sole rights to a discovery Designed to foster invention and innovation
Guarantees new idea cannot be stolen from inventor
72
73
74
75
Made possible by relationships between wireless providers, networks and users Multipath errors can cause problems
Signals reflecting off nearby objects
76
77
78
38.11.2Location-IdentificationTechnologies
Technology Cell of Origin (COO) Degree of Accuracy Least accurate. User could be anywhere in towers range. Meets only Phase I of E911 Act. Angle of Arrival (AOA) Fairly accurate. User is within the overlap of two towers cell sites. Used primarily in rural areas where there are fewer towers. Complies with Phase II of E911. Time Difference of Arrival Accurate. Users location is determined by triangulating (TDOA) from three locations. Complies with Phase II of E911. Most effective when towers are close together. Enhanced Observed Time Accurate. Users location is determined by triangulating Difference (E-OTD) from three locations. Complies with Phase II of E911. Location Pattern Matching Accurate. Users location is determined by analyzing multipath interference in a given area, making the method more effective for locating a device in an urban area. Global Positioning Systems Highly accurate. Satellites determine a users location (GPS) anywhere on earth. However, GPS is not as effective when the user is indoors. Fig. 38.6Location-identification technologies.
79
Push
Company delivers messages at time it deems appropriate
80
81
82
M-wallets
Users store billing and shipping information Recall with one click Promote convenience
83
84
38.14PrivacyandtheWirelessInternet CITA
Cellular Telecommunications and Internet Association Group that has created guidelines for consumer privacy Outlined four guidelines
Alert consumers when location being identified Always use opt-in marketing Consumers able to access their own information Same protections offered by all devices and carriers