1 / 21

Electronic Business Systems

Electronic Business Systems. Yong Choi School of Business CSU, Bakersfield. Definition of EC. Electronic commerce (EC) is an emerging concept that describes the buying and selling of products, services and information via and the Internet and computer networks (EDI). E-Business?.

msophia
Download Presentation

Electronic Business Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Electronic Business Systems Yong Choi School of Business CSU, Bakersfield

  2. Definition of EC • Electronic commerce (EC) is an emerging concept that describes the buying and selling of products, services and information via and the Internet and computer networks (EDI). • E-Business?

  3. EC vs. Traditional Commerce

  4. History of EC • 1970s: Electronic Funds Transfer (EFT) • Used by the banking industry to exchange account information over secured networks • Late 1970s and early 1980s: Electronic Data Interchange (EDI) for e-commerce within companies • Used by businesses to transmit data from one business to another • 1990s: the World Wide Web on the Internet provides easy-to-use technology for information publishing and dissemination • Cheaper to do business (economies of scale) • Enable diverse business activities (economies of scope)

  5. Why business is interested in EC? • Not just save cost and increase productivity • Paper check Vs. E-check • Change the nature of competition • Etrade.com / Amazon.com • Create new businesses • Citrix.com / Priceline.com

  6. Ecommerce infrastructure • Information superhighway infrastructure • Internet, LAN, WAN, routers, etc. • telecom, cable TV, wireless, etc. • Messaging and information distribution infrastructure • HTML, XML, e-mail, HTTP, etc. • Common business infrastructure • Security, authentication, electronic payment, directories, catalogs, etc.

  7. E-COMMERCE BUSINESS MODELS 5-7

  8. Some examples • B2B: GM and suppliers (SCM) • B2C: Amazon • C2B: Priceline • C2C: ebay • G2C: Paying tax, Vehicle registration • B2G: Lockheed (prodcuts/services to DoD)

  9. Intranet • A private version of the Internet • Use TCP/IP • A network that uses a Web Browser as a universal applications client and that is accessible only by individuals within a particular enterprise

  10. ERP Servers Clients Legacy systems Public/External Internet Users Intranet E-mail servers Web servers Firewalls Databases The Intranet (cont.) 10

  11. Extranet • A collection of Intranets (known as extended Intranet) • Also use TCP/IP • A network that links business partners to one another over the Internet by tying together their corporate intranet

  12. Extranet Consumers Suppliers Enterprise Internet VPN Intranet VPN Remote Employees Intranet Clients VPN VPN VPN Distributors Intranet Intranet Intranet Business Partners The Extranet (cont.)

  13. E-Commerce Security • Cryptography • Encryption and decryption of information • Any information (such as order) in cyberspace must be delivered securely using cryptography technology. • History of Cryptography • Have a history of at least 4000 years

  14. Cryptography • Rewrite contents (encryption) so that they cannot be read without key • Encrypting function: Produces encrypted message • Decrypting function: Extracts original message • Basic foundations • Secret key (symmetric) Cryptography • Public key (asymmetric) Cryptography • Digital signature

  15. Secret Key Cryptography • Use a single key • Key: a set of random numbers to encrypt/decrypt information • Known as symmetric encryption or private key encryption • The same key is used by sender and receiver • Easy to use, suitable when only two distinctive parties are involved • Less secure (than public key cryptography), when many parties are involved

  16. Keysender (= Keyreceiver) Keyreceiver Scrambled Message Scrambled Message Original Message Original Message Internet Sender Receiver Decryption Encryption Secret Key Cryptography (symmetric)

  17. Public Key Cryptography • Use a pair of key (public and private) • Known as asymmetric encryption • Requires sharing of both keys • The public key: known to all authorized users • The private key: known only to key’s owner • Easy to use, more secure than secret key cryptography, suitable when many parties are involved, and so on.

  18. Public Keyreceiver Private Keyreceiver Scrambled Message Scrambled Message Original Message Original Message Internet Sender Receiver Public Key Cryptography Mechanism Message

  19. Digital Signature • Public key cryptography problem • Receiver cannot ensure that a message is actually coming from sender. • Your subordinate can send a fake message using your email system - which looks originated from “REAL” you.

  20. Digital Signature • Goal • Guarantee that message must have originated with a certain entity (increase security) • Idea • Encrypt digital signature with private key • Decrypt digital signature with public key • Only owner of private key could have generated original signature

  21. Private Keysender Public Keysender Scrambled Message Scrambled Message Original Message Original Message Internet Sender Receiver Digital Signature Digital Signature

More Related