E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

22
E-Commerce

Transcript of E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Page 1: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

E-Commerce

Page 2: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Areas

• Definitions

• Needs

• Technical Infrastructure

• History

• Benefits

• Limitations

• Security

Page 3: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Definitions

• New way of conducting business – electronically using networks and the Internet

• Networked communications is the infrastructure• Kalakota and Whinston (1997) define EC from

these perspectives:– Communications perspective– Business process perspective– Service Perspective– Online perspective

Page 4: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Definitions

• Communications perspective– Delivery of information/products/services over

telephone lines, computer networks or any other electronic means

• Business process perspective– Application of technology toward the automation

of business transactions and work flow

Page 5: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Definitions

• Service Perspective– Tool that addresses the desire of firms, consumers, and

management to cut service costs

– While improving the quality of goods and increasing the speed of delivery

• Online perspective– Provides the capability of buying and selling products

and information

– On the internet and other online services

Page 6: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Definitions

• Turban (2002) adds

• Collaborations Perspective– The framework for inter and and

intraorganisational collaboration

• Community Perspective– Provides a gathering place for community

members to learn, transact, and collaborate

Page 7: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

E Commerce

• IT has become the major facilitator of business• Networked Computing - Business transactions

take place via telecommunication networks– Business-to-customer (B2C)

– Business-to-business (B2B)

– Consumer-to-business (C2B)

• Most popular platforms– Internet/Intranet/extranet

Page 8: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Internet, Intranet and Extranet

• Internet– Public and global communication network that

provides connectivity to anyone over a LAN or ISP

– Public network that is connected and routed over gateways

– Most common platform for B2C EC

– Lack of control that may result in an unruly proliferation of information

– Need effective and efficient search engines to navigate

Page 9: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Intranet• Intranet

– Corporate LAN or WAN– Uses internet technologies (TCP/IP)– Secured behind firewall (access control server)– Links various servers, clients, databases and application programs– Most common platform for corporate internal management– Used to enhance the communication and collaboration among

authorised• Employees• Customers• Suppliers• Business partners

Page 10: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Extranet• Extranet (extended intranet)

– Links intranets in different locations– Link using the internet– Improvement of security of connection portions of the internet

required– Done using cryptology and authorisation algorithms (tunneling

technology)– The internet with tunneling technology is known as virtual private

network (VPN)– Most common platform for B2B EC– Provide connectivity between an organisation and business partners,

materials suppliers, financial services, government and customers– Allows companies to collaborate, share and exchange information

Page 11: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Needs for E Commerce

• Supporting information• Organisational infrastructure

– People– Policy– Technical standards and protocols– Network infrastructure– Interfacing infrastructure

• Systems• Applications

Page 12: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Systems

• Electronic data interchange (EDI)

• Extranets

• Electronic Funds transfer (EFT)

• Electronic Payment Systems

• Electronic forms

• Integrating messaging

• Shared Databases

Page 13: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Applications

• More than just a website– Home banking– Online shopping– Buying stocks– Finding a job– Conducting an auction– Collaborating electronically

Page 14: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

History

• Early 1970s– Limited to large corporations

• 1990’s– Rapid growth of internet– Dependibility of networks– Development of protocols/software/specifications– Rapid expansion in EC – telecommunication applications

• Late 1990’s– Innovative applications– Advertisement to auctions to virtual reality experiences– Dramatic increase in business web presence

Page 15: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Benefits to Organisations

• Expands the marketplace

• Decrease cost of distributing information

• Can provide competitive advantage

• Initiates business process reengineering

• Improved image, customer service.

Page 16: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Benefits to Consumers

• Shop/other transactions 24 hours a day form any location

• Provides more choice• Frequently provides less expensive products• Receive information in seconds• Participate in virtual auctions• Interact with other communities in electronic

communities• Facilitates competition, which results in substantial

discounts

Page 17: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Benefits to Society

• Enables individuals to work from home– Less traffic, lower air pollution

• Less affluent people can buy more and increase their standard of living

• Enables Third World countries/rural areas to enjoy products and services (college degrees)

• Anything else?

Page 18: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Limitations - Technical

• Lack of system security, reliability, standards• Insufficient telecommunication bandwidth• Software development tools evolving and

changing rapidly• Difficult to integrate internet and EC software

with some existing applications and databases• Some EC software might not fit with some

hardware, or may be incompatible with some operating systems

Page 19: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Limitations - nontechnical

• Cost and Justification• Lack of trust and user resistance• Other Limiting factors

– Legal issues– Evolving– Profitibility– Human relationships– Expensive.

Page 20: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Internet Security

• Often sites as the major barrier to EC• National Computer Security Association (NCSA) has

identified 4 cornerstones of secure EC

• Authenticity– is the sender who they claim to be– TCP/IP uses password -Passwords can be intercepted– IP addresses can also be screened to prevent unauthorised

access– IP Spoofing – hacker can send a message that appears to

come from a particular domain

Page 21: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Internet Security• Privacy

– Breaches of privacy can occur both during and after transmission– Transaction log– Cookies

• Integrity– Have the contents of a message been mofified during transmission– Data packets are susceptible to capture and modification while en

route– Example: a hacker might modify the address where the contents

of a web form will be submitted. The user might fill in a credit card number on a form, click Submit and unknowingly transmit the information to the hackers server.

Page 22: E-Commerce. Areas Definitions Needs Technical Infrastructure History Benefits Limitations Security.

Internet Security

• Nonrepudiation– Can the sender of a message deny that they actually sent a

message?– The key here is a “signature” that makes it difficult to dispute

• In short, securing an EC site requires that the cornerstones be secured– Privicy of data and messages must be protected– Identities must be verified and verifiable– Unauthorised access must be controlled

• Ensuring security of an EC site is extremely complex task