1 / 50

Discovering the Internet Complete Concepts and Techniques, Second Edition

Discovering the Internet Complete Concepts and Techniques, Second Edition. e-Business ( Chapt.7) Model, e-Transaction, Data I nterchange & Fund Transfer Standard Internet Security Risk & Safeguards ( Chapt.2,4,6 ) Hackers, Viruses, Malicious, Spyware, Spam.

Download Presentation

Discovering the Internet Complete Concepts and Techniques, Second Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Discovering the InternetComplete Concepts and Techniques, Second Edition • e-Business (Chapt.7) • Model, e-Transaction, Data Interchange & Fund Transfer Standard • Internet Security Risk & Safeguards • (Chapt.2,4,6 ) • Hackers, Viruses, Malicious, Spyware, Spam Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  2. Objectives • Describe the origins of electronic business transactions including the electronic funds transfer (EFT) system, the electronic data interchange (EDI) standard, and value-added networks (VANs) • Discuss unique e-business factors and identify e-businesses that use them • Define common e-business models and explain how each model generates revenues • Describe the e-retailing storefront software, merchant accounts, and payment-processing services needed to create and operate an online store Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  3. E-Business Origins • Electronic business activities originated in the 1960s • Electronic Funds Transfer (EFT) System • Banking industry’s system that allows the electronic exchange of funds between banks via the Automated Clearing House (ACH) network Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  4. E-Business Origins • Electronic Data Interchange (EDI) standard • standard specifies the layout or format a company uses to exchange electronic business data Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  5. Unique E-Business Factors • E-business advantages include worldwide sales opportunities, reduced transaction and purchasing costs, and access to small, niche markets • Other unique e-business factors include • Geography, Time, and Space • The Network Effect • Redefining Markets • Personalization and Customization Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  6. Unique E-Business Factors • Geography, Time, and Space • Geography, time, and space are limiting factors for brick-and-mortar businesses • Physical location must be near potential customers • Operating hours may be limited to peak shopping hours • Inventory is limited to storage and shelf space • Online marketspace is not confined by geography, time, and space • Physical location is not a factor; an online store is available anywhere in the world that Internet access is available • Online stores operate 24 x 7 • Product selection and shelf space is virtually limitless

  7. Unique E-Business Factors Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  8. Unique E-Business Factors • The Network Effect • Refers to the increasing value of a network as it grows • Network becomes more valuable to its users as more and more users connect to it Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  9. Unique E-Business Factors • Disintermediation • Eliminating traditional intermediaries • Computer industry • Travel industry Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet Redefining Markets • Market redefinition taking place in one of two ways • By removing traditional marketplace intermediaries (disintermediation) • By creating new ways to add value to business transactions, often by introducing new types of intermediaries (reintermediation)

  10. Unique E-Business Factors • Redefining Markets (cont'd) • Reintermediation • Introduction of a new type of intermediary into the marketspace • Dell, Hewlett-Packard, and other online versions of stores • Orbitz and Hotels.com in the travel industry Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  11. Unique E-Business Factors • Personalization and Customization • Personalization – an automatic process that tailors Web page content to fit the profile of a specific target audience • Customization – a manual process that allows a viewer to manage Web page content Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  12. E-Business Models • Exactly how a commercial Web site makes money is not always obvious • Answer lies in the e-business model followed by the company that publishes the site • A business model is the way a company operates to generate revenues, create profits, and continue as a viable business entity • Individual e-businesses optimize factors such as geography, time, space, the network effect, personalization, and customization within the framework of their e-business model Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  13. E-Business Models Chapter 7: Understanding E-Business

  14. E-Business Models • E-businesses often operate using a mix of e-business models and revenue-generation methods • Offering subscription-based content • Selling advertising space at its Web site • Earning referral fees by providing links to other e-business Web sites • Selling proprietary e-business technologies • Providing a channel for business partners • Participating in an affiliate marketing program Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  15. E-Business Models • Business-to-Consumer (B2C) • E-retail business model that generates revenues by • Selling products and services directly to consumers • Selling Web-site advertising space • Charging subscription fees for premium content • Traditional brick-and-mortar and catalog retailers now are brick-and-click e-retailers • Many other diverse retailers now sell their products online Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  16. E-Business Models Chapter 7: Understanding E-Business

  17. E-Business Models • Business-to-Consumer (B2C) (cont'd) • Pure-playe-retailers operate only on the Web • Amazon.com Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  18. E-Business Models • Business-to-Consumer (B2C) (cont'd) • Some e-retailers generate revenues by selling Web site advertising • Some B2C sites generate revenues by charging subscription fees for premium content • Resume posting and job search • Posting personal ads • Participating in an online community Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  19. E-Business Models • Business-to-Consumer (B2C) (cont'd) • Social networks sell ad space • Social bookmarking or tagging sites help to build traffic • Businesses often use social networking, such as Twitter, to broadcast business messages Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  20. E-Business Models • Consumer-to-Business (C2B) • Allows a buyer to name his or her own price for specific goods or services which are then presented to multiple sellers (reverse auction) • When a seller accepts a buyer’s offer, the buyer’s credit card is immediately charged • Revenues are generated via booking fees and commissions on accepted offers Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  21. E-Business Models • Consumer-to-Consumer (C2C) • Brings individual buyers and sellers together in an online marketspace • Online auctions • Exchange of equally valued items • Online classified ads • Generates revenues via transaction fees, sales commissions, subscription fees, and personal ad fees Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  22. E-Business Models Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  23. E-Business Models • Business-to-Business (B2B) • Transactions account for an ever increasing share of total e-business revenues • B2B e-business models generate revenues in a number of ways • Business directory listing fees • Web site advertising • Subscription or membership fees • Referral fees • Transaction fees Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  24. E-Business Models • B2B Exchanges create online marketspaces in which businesses can buy and sell with each other following exchange rules which determine how buyers and sellers • Communicate with each other • Negotiate price • Make payment • Deliver product or service Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet Business-to-Business (B2B) (cont'd) • B2B e-business models generate revenues in • Sales commissions • Web site hosting fees • File storage fees • Software licensing and rental fees • Affiliate marketing programs

  25. E-Business Models • Technology Providers • Large portion of total B2B e-business is conducted between e-businesses and their technology providers • NSPs • Software developers, distributors, and sellers • E-retailers and B2B exchanges that sell their proprietary technologies to other e-businesses • Web hosting companies • Online storage services • Content Delivery Networks (CDNs) • Application Service Providers (ASPs) Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet Business-to-Business (B2B) (cont'd) • Affiliate Marketing Programs • Designed to drive viewer traffic to an e-business Web site • Affiliate marketing program participant, sometimes called associate, adds a link to the e-business Web site from own Web site • Associate is paid when viewer clicks through to the e-business Web site and makes a purchase  Amazon Associates Program

  26. E-Business Models • Business-to-Government (B2G) • Provides businesses with information on bidding opportunities for government agency contracts • Sells technologies to manage the bidding and procurement process • Provides businesses with information on bidding opportunities for government agency contracts • Sells technologies to manage the bidding and procurement process Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  27. Summary of e-commence • Describe the origins of electronic business transactions including the Electronic Funds Transfer (EFT) system, the Electronic Data Interchange (EDI) standard, and value-added networks (VANs) • Discuss unique e-business factors and identify e-businesses that use them • Define common e-business models and explain how each model generates revenues • Describe the e-retailing storefront software, merchant accounts, and payment-processing services needed to create and operate an online store Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  28. Network Security Issues & Technologies • Internal threats • Security policies & procedures • Authorized network access • Wireless network security • Data backup and restore • Disaster recovery planning Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  29. Network Security Issues & Technologies • External threats • Unauthorized network access. Hacker who uses his/her programming skills to gain unauthorized access to network. • Computer viruses Viruses Infect executable program files, spread to other files by email or a click to run; • Firewalls (personal and network) and proxy servers Monitor and report network traffic, filter or block incoming/outgoing traffic by administration rules. • Internet filtering software Vendors: WebSpy and Websense can monitor/restrict employee Internet access. Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  30. Using the Web: Risks and Safeguards – Protecting online transaction • Transactional risks • Protecting and validating online transaction information • by using Certificates

  31. Using the Web: Risks and Safeguards – Protecting Your Computer from Hackers • Protecting Your Computer from Hackers • A hackeris an individual who uses his or her computer skills to access a network and the computers on that network without authorization • A firewall (hardware/software) blocks outside intruders • Home computers: personal firewall to protect against hackers • Windows Firewall • ZoneAlarm: • PCTools Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  32. Using the Web: Risks and Safeguards – Protecting Your Computer from Hackers (cont’d) • Protecting Your Computer from Hackers • ZoneAlarm: ZoneAlarm Free Firewall blocks viruses that antivirus alone misses, stops hackers attempting to break into your computer, and unlike the default Windows firewall, provides outbound firewall protection to stop spyware from phoning home and botnets from taking over your PC. Read more: download.cnet.comhttp://download.cnet.com/ZoneAlarm-Free-Firewall/3000-10435_4-10039884.html#ixzz2yGXiWGMX • PCTools Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  33. Using the Web: Risks and Safeguards – Protecting Your Computer from Viruses • Protecting Your Computer from Viruses • A computer virus is a small, potentially damaging computer program that can infect a computer and then spread to other computers. Virus includes: Worm a special kind of virus that spreads across a network (continually replicate); Trojan horse is a program appearing fun or useful that actually does something harmful or destructive. Through: • Sending/receiving e-mail • Downloading files • Exchanging word processing or spreadsheet files • Install virus protection software to protect against infection Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  34. Using the Web: Risks and Safeguards http://www.top10antivirussoftware.com/index.php

  35. Using the Web: Risks and Safeguards – Using McAfee Prod Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  36. Using the Web: Risks and Safeguards – Using McAfee Prod Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  37. Using the Web: Risks and Safeguards – Using McAfee Prod

  38. Using the Web: Risks and Safeguards – Using McAfee Prod

  39. Using the Web: Risks and Safeguards – Protecting Your Computer from Firewall & Proxies Firewall - Proxy Server - A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

  40. Using the Web: Risks and Safeguards – Protecting Your Computer from Online Shopping • Shopping Safely Online • Use reputable online vendors such well know companies: Dell, Barnes & Noble, Delta and America Airlines • The U.S. government Website http://www.onguardonline.gov/ provides great resources about shopping online safeties • Pay with a credit card over a secure (SSL) connection • Use a third-party payment service if participating in consumer-to-consumer transactions Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  41. Using the Web: Risks and Safeguards – Protecting Your Private Information • Keeping Your Personal Information Private • Entities that might be collecting and using your private information • Employers • Internet Service Providers • Government agencies • Privacy advocates • E-Business Web sites • Cookies • Spyware and adware Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  42. Using the Web: Risks and Safeguards – Protecting Your Private Information • Web is a largely unregulated environment • Tracking Protection Lists (TPLs) – it can help enhance your privacy by preventing the websites you visit from automatically sending details about your visit to other content providers. When you install a TPL, a Do Not Track signal will be sent to websites and content providers not already blocked by the TPL. • Use Web content filters (Internet filters) – setup in the Internet Options

  43. Using the Web: Risks and Safeguards – Protecting Against Malicious Websites • Protecting Against Malicious Web Sites • A malicious Web site is a phony site designed to look like a legitimate site • Used by thieves to collect personal information • Name • Password • Internet Explorer has built-in SmartScreen Filter that evaluates sites Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  44. Well Setting up e-Mail – Protecting Against Viruses & Junk emails Chapter 4: Communicating Online

  45. Well Setting up e-Mail – Protecting Against Viruses & Junk emails • Junk E-Mail Options • Spam can be used for • Phishing – attempts to collect personally id information, credit card numbers, bank account information • Stock-manipulation schemes – scams encouraging unwary investors to buy a specific stock, thereby artificially inflating the stock’s value • “Nigerian Sting” operations – fraudulent requests for money • To set spam or junk e-mail options, you can click the Junk button arrow in the Delete group on the Mail Home tab, and then click the Safety options command to open the Safety Options dialog box Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  46. Well Setting up e-Mail – Protecting Against Viruses & Junk emails Chapter 4: Communicating Online

  47. Well Setting up e-Mail – Protecting Against Viruses & Junk emails Chapter 4: Communicating Online

  48. Network Security Issues & Technologies - Unauthorized network access references • How to Prevent Unauthorized Computer Access • Edited by Chris, Steve, Jeff, Mel and 3 others • 1. Set up password protection. • 2. Install a hardware or software firewall. • 3. Install antivirus software or a spyware protection program. • 4. Use caution when reading email. • • Open email attachments only if you trust the party that sent it. Many times, email attachments will house viruses and malicious spyware that will allow unauthorized access to your computer. • • Ignore or delete phishing emails, which are email messages that masquerade as official emails from your bank or shipping companies that want you to divulge sensitive and private information; such as your social security number, passwords and more. • 5. Learn how to lock your computer. Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

  49. Network Security Issues & Technologies - Unauthorized network access references • Prevent unauthorized users from gaining network access • Hardware-wise you have the switches VLAN, ACLs etc.... • Software wise - consider using a proxy server for internet and/or a product like Sophos unified threat management or similar which will put any non monitored connection in a 'quarantine' perimiter zone and depending on your settings, check it has the latest security patches and antivirus and if it doesn't give them the option to update before they get access - or downright deny access

  50. External threats Unauthorized network access Computer viruses Web page hacking Firewalls and proxy servers Internet filtering software Security audits Summary of Security Issues & Protection • Internal threats • Security policies and procedures • Authorized network access • Wireless network security • Data backup and restore • Disaster recovery plan Week 13 04/10/2014 Course TECH 2150 Dr. Simon Qiu Textbook Contents of Course Technology, Discovering the Internet

More Related