itec Flashcards
what does e-commerce mean?
electronic commerce
buying and selling goods and products over internet
e-commerce
invention of the very old notion of “buy and sell”
e-commerce
process of execution of commercial transactions electronically
e-commerce
brings some new technology and new capabilities to business the best-known idea in electronic commerce
e-commerce
has been Electronic Data Interchange (EDI)
e-commerce
2 types of data interchange
- No Electronic Data Interchange (NEDI)
- With Electronic Data Interchange (EDI)
it is a process that has no paper and no people involved
With Electronic Data Interchange (EDI)
it is a process that involves paper and people
No Electronic Data Interchange (NEDI)
the ability to use these technologies appeared in the late _____ and allowed business companies and organizations to send commercial documentation electronically
1970s
Commercial enterprise on the Internet was strictly prohibited until ____
1991
around ____ when the first internet online shopping started
1994
it took about ____ years to introduce security protocols
five (5)
end of ____, many European and American business companies offered their services through the World Wide Web
2000
Types of E-commerce Applications
- Business-to-Consumer
- Business-to-Business
- Consumer-to-Consumer
- Peer-to-Peer
- m-Commerce
activities that focus on retail transactions rather than activities conducted between two businesses
Business-to-Consumer
transactions between businesses, such as between a manufacturer and a wholesaler, or between a wholesaler and a retailer
Business-to-Business
involves the electronically facilitated transactions between consumers through some third party
Consumer-to-Consumer
refers almost exclusively to computer-based systems of sharing information directly with others via the Internet. It employs a network to put individuals in direct contact with each other in some form
Peer-to-Peer
is short for mobile commerce
m-Commerce
It is used to refer to the growing practice of conducting financial and promotional activities with the use of wireless handheld device. the transactions may be conducted using cell phones, personal digital assistants and other hand held devices that have operate with Internet access
m-Commerce
example of Business-to-Consumer (B2C)
Amazon.com
a general merchandiser that sells consumer products to retail consumers
Amazon.com
example of Business-to-Business (B2B)
eSteel.com
a steel industry exchange that creates an electronic market for steel producers and users
eSteel.com
example of Consumer-to-Consumer (C2C)
eBay.com
creates a marketspace where consumers can auction or sell goods directly to other consumers
eBay.com
creates a marketspace where consumers can auction or sell goods directly to other consumers
eBay.com
example of Peer-to-Peer (P2P)
Gnutella
which two biggest competing classified sites in the country merged?
sulit and ayosdito
a software application that permits consumers to share music with one another directly, without the intervention of a market maker as in C2C e-commerce
Gnutella
example of M-commerce (Mobile Commerce)
wireless mobile devices such as PDAs (Personal Digital Assistants) or cellphones
it can be used to conduct commercial transactions
PDAs (Personal Digital Assistants) or cellphones
US based multinational electronic commerce company
Amazon
He founded Amazon.com, Inc. in 1994 and launched it online in 1995
Jeff Bezos
original name of Amazon
Cadabra, Inc.
software, hardware and network platform developed by Amazon.com subsidiary ______
Lab126
online auction website
eBay
first items sold on eBay was a ________ for _____
broken laser pointer
$14.83
last ____, eBay launched its Business & Industrial category, breaking into the industrial surplus business
2005
Generally, anything can be auctioned on the site as long as it is not illegal and does not violate the company’s Prohibited and Restricted Items policy.
eBay
a major ecommerce presence not just in the Philippines, but across Southeast Asia
Lazada
owned German e-commerce company founded by Rocket Internet in 2011
Lazada
the site offers a wide range of items, including fashion apparel, electronics, car accessories, and home appliances
Lazada
it has agreed to allow retail giant SM Investments, to use the store to sell its merchandise
Lazada
Philippine classified ads site Sulit rebranded as ____ in 2014
OLX
the deal translated into the merging of brands between Sulit and Ayosdito (the two were the biggest competing classifieds sites in the country)
OLX
As a result of the merger, Ayosdito users were redirected to OLX as of ____
2015
a secure system accomplishes its task with no unintended side effects
e-commerce security
In the software development community, it describes the security features of a system
e-commerce security
Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data
e-commerce security
information must be kept from unauthorized parties
privacy
message must not be altered or tampered with
integrity
sender and recipient must prove their identities to each other
authentication
proof is needed that the message was indeed received
non-repudiation
security concerns
- privacy
- integrity
- authentication
- non-repudiation
securities on-line
- Digital Signatures and Certificates
- Secure Socket Layers (SSL)
- Firewalls and Kerberos
the _____ is always responsible for security of the Internet connected PC where customer details are handled
merchant
Where customers order by email, information should be encrypted by the?
merchant
Where credit cards are taken online and processed later, it’s the _____ responsibility to check the security of the hosting company’s web server
merchant’s
attacks
- Tricking the shopper
- Snooping the shopper’s computer
- Sniffing the network
- Guessing passwords
- Using denial of service attacks
- Using known server bugs
- Using server root exploits
attacks and their defenses
- Install personal firewalls for the client machines.
- Store confidential information in encrypted form.
- Encrypt the stream using the Secure Socket Layer
- Use appropriate password policies
- Use threat model analysis, strict development policies, and external security audits