E-Commerce and E-Business

Size: px
Start display at page:

Download "E-Commerce and E-Business"

Transcription

1 E-Commerce and E-Business Miguel Rebollo Introduction to Computer Science

2 Aims Describing the phases a company goes through using Internet for business Describing the forms of e-commerce Describing the purpose and uses of intranets and extranets Describing the use od web sites to support commercial transactions Describing the ethical issues of e-commerce

3 Contents 1. E-Commerce in perspective 2. Intranets: internal business processes 3. Extranets: business alliances 4. B2C: customer-centered web design 5. Technical requirements for e-commerce 6. Ethical issues of e-commerce

4 Created in 1994 Opened in July 1995 as a virtual book-stores 20 mill. customers in 160 countries Survivor of.dot crises Powerful recommendation system Jeff Bezos. Amazon founder

5 E-commerce in Perspective Sharing business information, maintaining business relationships and conducting business transactions through the use od telecomm. networks Involves reorganising business processes

6 E-comm Transforms Business.com companies (virtual) Essential, or at least important for the rest Increases speed and efficiency of business processes Variants: e-commerce i-commerce (electronic) (internet) m-commerce (mobile)

7 E-Comm Models B B business-to-business (B2B) C business-to-consumer (B2C) C consumer-to-business (C2B) consumer-to-consumer (C2C) Put examples of each case

8 Intranets Basis for B2E: internet supporting internal activties Improve comm. inside the company Advantages cross-platform open standards minimal user training

9 Characteristics of a B2E Intranet physical tech: LAN with Ethernet middleware: software which handles physical comm. (TCP/IP based) firewall sw for security standard web applications: browsers, clients, file sharing

10 Characteristics of a B2E Intranet physical tech: LAN with Ethernet middleware: software which handles physical comm. (TCP/IP based) firewall sw for security standard web applications: browsers, clients, file sharing

11 How To Use B2E Intranets Information access for employees: centralised databases with a common interface Collaboration and teamwork: distribute information, remote working groups Internal business transactions: increase efficiency and reduces paperwork

12 Extranets Business Alliances Link intranets of different companies (e-marketplaces) Activities between trusted business partners Functionalities place orders check stock level confirm inoice status exchange business information

13 Extranets with Public Networks use public, open comm. lines without additional security mechanisms low cost, but low security (and high risk) protection: firewalls and logons

14 Extranets with Public Networks use public, open comm. lines without additional security mechanisms low cost, but low security (and high risk) protection: firewalls and logons

15 Extranets with VPN use public, open comm. lines an special protocol creates a virtual tunnel across the intranets VPNs are becoming the preferred method: economical and secure enough

16 Extranets with VPN use public, open comm. lines an special protocol creates a virtual tunnel across the intranets VPNs are becoming the preferred method: economical and secure enough

17 Extranets with Private Networks physically attached lines (leased) high cost high security levels extent of access for external users (only business partners)

18 Extranets with Private Networks physically attached lines (leased) high cost high security levels extent of access for external users (only business partners)

19 B2C Customer centered web design Often interactive features included CRM: customer relationship management critical without personal contact database with relevant information: preferences, past purchases, communications...

20 Features of Well Designed Sites Speed of transactions Large, up-to-date selection (the Long Tail ) Ease of use Secure transations After-sale features

21 Technical Requirements: Web Server Hw&Sw to store pages and handle trafic Only large companies have the know-how and the capability to run their own server

22 Technical Requirements: Hosting Service Provide space in their own servers and tools to set up business web pages Handle almost all transactions steps (including payments)

23 Technical Requirements: Software Provides commercial services Database (catalogue) + front-end Capabilities: security, search engine, data analysis

24

25 Company Policies A Code of Ethics Privacy policy of the organisation Permission to transmit people data How company inform customers about the use of personal data Ownership about network posting and communications Tracking of user behaviours

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS

CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS CHAPTER 13: ELECTRONIC COMMERCE AND E-BUSINESS Multiple Choice: 1. founded Amazon.com. A. Alan Kay B. Jeff Bezos C. Bill Gates D. Andy Grove Answer: B Reference: Jeff Bezos: The Virtual Bookseller Difficulty:

More information

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33

contents CHAPTER 1 CHAPTER 2 Strategic Decision Making 32 Information Systems in Business 1 Opening Case: Revving Up Sales at Harley-Davidson 33 contents CHAPTER 1 Information Systems in Business 1 INTRODUCTION 5 Apple Merging Section 1.1 Information Systems in Business 5 INFORMATION TECHNOLOGY'S ROLE IN BUSINESS 5 Information Technology's Impact

More information

Internet Part 2. CS/MIS Department

Internet Part 2. CS/MIS Department Oman College of Management and Technology Course 803202 MDCI Internet Part 2 CS/MIS Department Reasons for Business Presence on the Internet Major reasons why business presence on the Internet is increasing

More information

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of Chapter 3 E business Infrastructure 1 Learning outcomes Outline the hardware and software technologies used to build an e business infrastructure t within an organisation and with its partners Outline

More information

Wealth Management System

Wealth Management System Wealth Management System Clients in the new economy demand straight answers. With ubiquitous information on the Internet and an around-the-clock global financial market accessible by pagers, email, mobile

More information

How To Market Online

How To Market Online INTERNET MARKETING Daniela Andreini SCHEDULE time date day subject 1.30-4.30 pm May 20 Tue Introduction to Internet Marketing and E-commerce 1.30-4.30 pm May 22 Thu Internet and E-commerce: diffusion and

More information

Electronic Commerce. Chapter Overview

Electronic Commerce. Chapter Overview Electronic Commerce Chapter Overview This chapter presents an overview of how e-commerce works, from the perspective of the organization and the customer. Businesses and individuals use e-commerce to reduce

More information

Deploying IP-based Virtual Private Network Across the Global Corporation

Deploying IP-based Virtual Private Network Across the Global Corporation Deploying IP-based Virtual Private Network Across the Global Corporation STANISLAV MILANOVIC Serco Group plc Via Sciadonna 24/26, 00044 Frascati (RM) ITALY ZORAN PETROVIC Faculty of Electrical Engineering

More information

E-Business, E-Commerce

E-Business, E-Commerce E-Business, E-Commerce Lecture Outline 11 Instructor: Kevin Robertson Introduction to Information Systems Explain the differences between extranets and intranets as well as show how organizations utilize

More information

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary

Case-study: SwissAir. The Internet Business. Case-study: SwissAir. Case-study: SwissAir. Summary. Summary Case-study: SwissAir The Internet Business Old model: check flight info online Step 1. Toward customers e-ticketing, electronic check-in frequent flyer miles Web site personalization (and statistics!)

More information

IJMIE Volume 2, Issue 5 ISSN: 2249-0558

IJMIE Volume 2, Issue 5 ISSN: 2249-0558 E-Commerce and its Business Models Er. Nidhi Behl* Er.Vikrant Manocha** ABSTRACT: In the emerging global economy, e-commerce and e-business have increasingly become a necessary component of business strategy

More information

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. www.juniper.net 1 Copyright 2004 Juniper Networks, Inc. Proprietary and Confidential www.juniper.net 2 The Traditional Extended Enterprise Fixed

More information

1. Introduction to internet marketing

1. Introduction to internet marketing 1. Introduction to internet marketing 1 Introduction Marketing is the management process, which identifies, anticipates and supplies customer requirements profitably (Chartered Institute of Marketing)

More information

e-commerce Models. Let us look at each of them in detail. Business-to-Business (B2B) Model

e-commerce Models. Let us look at each of them in detail. Business-to-Business (B2B) Model e-commerce Models. Creating an e-commerce solution mainly involves creating and deploying an e-commerce site. The first step in the development of an e-commerce site is to identify the e-commerce model.

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Overview. E-business. What is e-commerce. The difference between E-commerce and E-business. Why IT is not enough

Overview. E-business. What is e-commerce. The difference between E-commerce and E-business. Why IT is not enough Overview E-commerce / E-business current developments and future directions Dr, Brunel University anastasia.papazafeiropoulou@brunel.ac.uk 3 Dec 2004 Introduction to E-commerce Technological infrastructure

More information

MKT-EM-1. Students will analyze how the Internet has influenced modern day business and industry.

MKT-EM-1. Students will analyze how the Internet has influenced modern day business and industry. PROGRAM CONCENTRATION: CAREER PATHWAY: COURSE TITLE: Marketing Sales & Service Marketing Communications and Promotion E-Marketing E-Marketing covers all functions of marketing from the standpoint of conducting

More information

CONTENTS. CHAPTER 2 emarketing Vs. TRADITIONAL MARKETING 32

CONTENTS. CHAPTER 2 emarketing Vs. TRADITIONAL MARKETING 32 CONTENTS CHAPTER 1 AN OVERVIEW OF THE STUDY 01 1.1 Background of the Study 02 1.2 Importance of the Study 05 1.3 Scope of the Study 07 1.4 Objectives of the Study 09 1.4.1 Academic Disciplines Concerned

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 5 Electronic Commerce System Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Electronic Commerce: Electronic commerce encompasses the entire online

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis

i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information

More information

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert Contents: 1.0 Introduction p2 1.1 Ok, what is the problem? p2 1.2 Port Forwarding and Edge based Solutions p2 1.3 What is a VPN? p2 1.4

More information

Outline. Introduction to E-commerce. Why is e-commerce? [Awad] What is e-commerce? Session 1. Yan Wang yan.wang@mq.edu.au. E-commerce.

Outline. Introduction to E-commerce. Why is e-commerce? [Awad] What is e-commerce? Session 1. Yan Wang yan.wang@mq.edu.au. E-commerce. Introduction to E-commerce Session 1 Yan Wang yan.wang@mq.edu.au Outline E-commerce E-business Examples of e-commerce Types of e-commerce 1 2 What is e-commerce? The marketing, buying and selling of products

More information

Mid-Term #1 Solutions

Mid-Term #1 Solutions Mid-Term #1 Solutions Chapter #1: Computers: Tools for an Information Age 1. Computers introduce the element into the modern economy. A. labor B. information C. capital D. land 2. Pie charts are an example

More information

Chapter 10 Objectives. Chapter 10 E-Commerce: A Revolution in the Way We Do Business. What Is E-Commerce? What Is E-Commerce? What Is E-Commerce?

Chapter 10 Objectives. Chapter 10 E-Commerce: A Revolution in the Way We Do Business. What Is E-Commerce? What Is E-Commerce? What Is E-Commerce? Chapter 10 Objectives Chapter 10 E-Commerce: A Revolution in the Way We Do Business Understand how e-commerce has changed today s business practices Discuss the positive impact of e-commerce on global

More information

Mobile Cloud Computing In Business

Mobile Cloud Computing In Business Mobile Cloud Computing In Business Nilam S. Desai Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, Changa, Gujarat, India ABSTRACT Cloud

More information

E-Business, E-Commerce, and Information Systems

E-Business, E-Commerce, and Information Systems E-Business, E-Commerce, and Information Systems Databases & The Digital Economy E-Business & E-Commerce There was a difference between the Old Economy and the New Economy The first consisted of traditional

More information

ICAB5238B Build a highly secure firewall

ICAB5238B Build a highly secure firewall ICAB5238B Build a highly secure firewall Release: 1 ICAB5238B Build a highly secure firewall Modification History Not Applicable Unit Descriptor Unit descriptor This unit defines the competency required

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

ELECTRONIC COMMERCE SYSTEMS

ELECTRONIC COMMERCE SYSTEMS CHAPTER ELECTRONIC COMMERCE SYSTEMS This chapter discusses one of the most visible segments of the business world today e-commerce. In general terms, the issues involve the electronic processing and transmission

More information

資 訊 管 理 個 案. E-commerce: Digital Markets, Digital Goods 1. Facebook, 2. Amazon vs. Walmart (Chap. 10)

資 訊 管 理 個 案. E-commerce: Digital Markets, Digital Goods 1. Facebook, 2. Amazon vs. Walmart (Chap. 10) Case Study for Information Management 資 訊 管 理 個 案 E-commerce: Digital Markets, Digital Goods 1. Facebook, 2. Amazon vs. Walmart (Chap. 10) 1011CSIM4B10 TLMXB4B Thu 8, 9, 10 (15:10-18:00) B508 Min-Yuh Day

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

Network Topology Comparison

Network Topology Comparison Topology Star Bus Each computer connects to a central connection device. Bus Single cable connects everything. Ring Single cable configured in a ring. Information Transfer All information passes through

More information

Pearson Education Limited 2003

Pearson Education Limited 2003 84 Activities Activity 5.1 (P. 171) Describe the order in which a message passes from one piece of hardware to the next when a home user in the UK sends an e-mail via the Internet to someone in a large

More information

Information Systems for Business Operations

Information Systems for Business Operations Information Systems for Business Operations MBA 8125 Week 1 Sources: Laudon & Laudon (2006) Straub (2002) Stacie Petter 2005 1 Outline Why Study IT? Information Systems Basics e-commerce Management Challenges

More information

How To Manage A Web Service

How To Manage A Web Service Job Description Internet Services Manager Organisation: Location: Reports to: Supervises: Working conditions: Last updated: {Add company name} {Add geographical location} {Add/edit as required} Infrastructure

More information

Figure 41-1 IP Filter Rules

Figure 41-1 IP Filter Rules 41. Firewall / IP Filter This function allows user to enable the functionality of IP filter. Both inside and outside packets through router could be decided to allow or drop by supervisor. Figure 41-1

More information

WHITE PAPER. Secure Data Center Access. Authentication and Encryption. Secure Web-to-host TCP/IP access with any tn server.

WHITE PAPER. Secure Data Center Access. Authentication and Encryption. Secure Web-to-host TCP/IP access with any tn server. WHITE PAPER Secure Data Center Access Authentication and Encryption Secure Web-to-host TCP/IP access with any tn server November 2001 Table of Contents Secure Data Center Access Need for data center security..

More information

Hi, My Name is Karen! GLOBAL E-BUSINESS & TRADE. Karen s Decision. Karen had a beautiful baby boy BUT her son would never know his father 2/24/2015

Hi, My Name is Karen! GLOBAL E-BUSINESS & TRADE. Karen s Decision. Karen had a beautiful baby boy BUT her son would never know his father 2/24/2015 1-1 Hi, My Name is Karen! 2 GLOBAL E-BUSINESS & TRADE Part I: Introduction and Developments in E-Business and E-Commerce Past, Present, and Future Karen had a problem. She was ling in Copenhagen with her

More information

API Oriented Architecture Security The development of SOA in an API oriented world. Security Swisscom (Schweiz) AG 23.3.2014

API Oriented Architecture Security The development of SOA in an API oriented world. Security Swisscom (Schweiz) AG 23.3.2014 API Oriented Architecture Security The development of SOA in an API oriented world. Security Swisscom (Schweiz) AG 23.3.2014 SOA Primer. Where API Oriented Architecture Comes from. Standard SOA thinking:

More information

E Commerce INTRODUCTION LEARNING OUTCOMES

E Commerce INTRODUCTION LEARNING OUTCOMES Topic 9 E Commerce LEARNING OUTCOMES By the end of this topic, you should be able to: 1. Describe the benefits and limitations of e-commerce; 2. Explain major EC mechanisms; 3. Differentiate between B2C

More information

Secure Network Design: Designing a DMZ & VPN

Secure Network Design: Designing a DMZ & VPN Secure Network Design: Designing a DMZ & VPN DMZ : VPN : pet.ece.iisc.ernet.in/chetan/.../vpn- PPTfinal.PPT 1 IT352 Network Security Najwa AlGhamdi Introduction DMZ stands for DeMilitarized Zone. A network

More information

1.264 Lecture 37. Telecom: Enterprise networks, VPN

1.264 Lecture 37. Telecom: Enterprise networks, VPN 1.264 Lecture 37 Telecom: Enterprise networks, VPN 1 Enterprise networks Connections within enterprise External connections Remote offices Employees Customers Business partners, supply chain partners Patients

More information

COURSE NUMBER: CTS 2371

COURSE NUMBER: CTS 2371 Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2371 COURSE TITLE: Virtual Infrastructure: Deployment, Security, and Analysis PREREQUISITE(S): CTS

More information

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems Knowledge Management Systems Chapter 5- The Technology Infrastructure Dr. Mohammad S. Owlia Associate Professor, Industrial Engineering Department, Yazd University E-mail :owliams@gmail.com, Website :

More information

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,

More information

Electronic Commerce Management for Business Activities and Global Enterprises:

Electronic Commerce Management for Business Activities and Global Enterprises: Electronic Commerce Management for Business Activities and Global Enterprises: Competitive Advantages In Lee Western Illinois University, USA IIS SCIENCE Keference/ Table of Contents Preface Acknowledgment

More information

Module 6. e-business and e- Commerce

Module 6. e-business and e- Commerce Module 6 e-business and e- Commerce 6.1 e-business systems 6.2 e-commerce systems 6.3 Essential e- commerce processes 6.4 Electronic payment processes 6.5 e-commerce application trends 6.6 Web store requirements

More information

Introduction to E-Commerce

Introduction to E-Commerce Introduction to E-Commerce 1/12/2016 What is E-commerce? Buying and selling of products or services over electronic systems such as the Internet and other computer networks Online purchase of goods or

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME Multiple Choice: 1. For patients living in remote places, doctors use the Web to practice: A. anamorphic projection. B. remote imaging. C. Telemedicine.

More information

For paid computer support call 604-518-6695 http://www.netdigix.com contact@netdigix.com

For paid computer support call 604-518-6695 http://www.netdigix.com contact@netdigix.com Setting up your vpn connection on windows 2000 or XP in continuation from installing x.509 certificate on windows (please do not continue if you have not installed your x.509 certificate): Instructions

More information

Chapter 11: E-Commerce

Chapter 11: E-Commerce Chapter 11: E-Commerce What is E-Commerce? E-commerce Act of doing business transactions using communications technology Has existed for years via private networks (electronic funds transfers, etc.) Now

More information

Trends in Electronic Commerce Among Selected Companies in Metro Manila, Philippines

Trends in Electronic Commerce Among Selected Companies in Metro Manila, Philippines Rev. Integr. Bus. Econ. Res. Vol 2(2) 534 Trends in Electronic Commerce Among Selected Companies in Metro Manila, Philippines Harvey T. Ong Faculty, Decision Sciences and Innovation Department Ramon V.

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

How To Configure Apple ipad for Cyberoam L2TP

How To Configure Apple ipad for Cyberoam L2TP How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the

More information

E-COMMERCE: HOW CAN BUSINESSES BENEFIT FROM E-COMMERCE?

E-COMMERCE: HOW CAN BUSINESSES BENEFIT FROM E-COMMERCE? E-COMMERCE: HOW CAN BUSINESSES BENEFIT FROM E-COMMERCE? Hasan AMCA and Anders JÖNSSON International Conference on Contemporary Issues in Information Technology in OIC Member States, July 26-27, 2005, Islamabad,

More information

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:

More information

Competencies (1 of 2)

Competencies (1 of 2) Chapter 2 The Internet, the Web, and Electronic Commerce Competencies (1 of 2) Discuss the origins of the Internet and the Web Describe how to access the Web using providers and browsers Discuss Internet

More information

,V :HE %DVHG (', IRU <RX" 7LPRWK\ 6]DO ', &RQVXOWLQJ 2SSRUWXQLW\ 0DQDJHU 6U &RQVXOWDQW 1HWZRUN 6HUYLFHV +DQJ 7HQ ZLWK ', $ 'HFDGH RI,QQRYDWLRQ DI1789

,V :HE %DVHG (', IRU <RX 7LPRWK\ 6]DO ', &RQVXOWLQJ 2SSRUWXQLW\ 0DQDJHU 6U &RQVXOWDQW 1HWZRUN 6HUYLFHV +DQJ 7HQ ZLWK ', $ 'HFDGH RI,QQRYDWLRQ DI1789 DI1789 History of Traditional EDI Internet Background Issues Driving Traditional EDI to the Internet Web Evolution Web Enabled EDI Architectures DI1790/1 EDI is not dead & will not be replaced by the

More information

Connecting to the FILTER Virtual Private Network (VPN)

Connecting to the FILTER Virtual Private Network (VPN) Create FILTER VPN Connection Filter s VPN allows computers at remote locations (e.g. home, hotels, Starbucks?) to connect directly and securely to FILTER s corporate network. Computers connected by VPNs

More information

How To Configure SSL VPN in Cyberoam

How To Configure SSL VPN in Cyberoam How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

Introduction to Electronic Commerce

Introduction to Electronic Commerce Introduction to Electronic Commerce 1 1 Electronic (e-) Commerce Def.: Activity of offering and contracting products and services via electronic ways, including all actuations which takes place before,

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

How Virtual Private Networks Work

How Virtual Private Networks Work How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater

More information

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY

C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY C - COMMERCE CONCEPTS MODELS STRATEGIES C.S.V. MURTHY. B. Sc, B.E., MIE. Chartered Engineer Industrial Consultant, Visiting Faculty at Various Management Colleges, BANGALORE. MUMB.Ai DELHI NAGPUR 'BANGALORE

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

ICAI4099A Build an intranet

ICAI4099A Build an intranet ICAI4099A Unit Descriptor Unit Sector Build an intranet This unit defines the competency required to design, build and implement an intranet for a client. It does not however cover aspects relating to

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security

Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security Protecting Your Enterprise Networks: A Comprehensive Approach for End-to-End Security Network security is mission critical for Multinationals to succeed in today s e-business environment without losing

More information

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated

More information

E-commerce. Web Servers Hardware and Software

E-commerce. Web Servers Hardware and Software E-commerce Web Servers Hardware and Software Basic technical requirements of a Web site that can support E-commerce operations and match business needs. Oct 22, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

E-BUSINESS CHAPTER 3. Chapter Three Overview 3.1. BUSINESS AND THE INTERNET. Disruptive versus Sustaining Technology. The Internet Business Disruption

E-BUSINESS CHAPTER 3. Chapter Three Overview 3.1. BUSINESS AND THE INTERNET. Disruptive versus Sustaining Technology. The Internet Business Disruption CHAPTER 3 Chapter Three Overview E-BUSINESS SECTION 3.1 - BUSINESS AND THE INTERNET Disruptive Technology Evolution of the Internet Accessing Internet Information Providing Internet Information SECTION

More information

Introduction to E-commerce

Introduction to E-commerce i Zheng Qin Introduction to E-commerce With 98 figures Springer Contents Part 1 Fundamentals 1 Fundamentals of E-commerce 3 1.1 The Origin and Development of E-commerce 4 1.1.1 The Origin and Development

More information

Understand the Concepts of the Internet, Intranet, and Extranet

Understand the Concepts of the Internet, Intranet, and Extranet Understand the Concepts of the Internet, Intranet, and Extranet Lesson Overview In this lesson, you will learn about: The Internet Intranets Extranets VPN Security Zones Firewalls Anticipatory Set: 1.

More information

Licensing Microsoft SharePoint Server 2013

Licensing Microsoft SharePoint Server 2013 Licensing Volume Licensing Microsoft brief SharePoint Server 2013 Licensing Microsoft SharePoint Server 2013 Table of Contents This brief applies to all Volume Licensing programs. Summary... 1 What s New

More information

e M a r k e t S e r v i c e s m a k e s i t e a s i e r f o r y o u t o u s e e l e c t ro n i c m a r k e t p l a ce s f o r i n t e r n a t i o n a l business BARRIERS TO EFFECTIVE E-BUSINESS e Business

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

ACS 1803. Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems

ACS 1803. Final Exam Topic Outline. Functional Area Information Systems. V. Enterprise Information Systems ACS 1803 Final Exam Topic Outline IV. Functional Area Information Systems a. Financial Information Systems (Lecture Outline 5.1) i. Budgeting Systems ii. Cash Management Systems iii. Capital Management

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

MANAGED FIREWALL SERVICE. Service definition

MANAGED FIREWALL SERVICE. Service definition MANAGED FIREWALL SERVICE Service definition Page 1 of 4 Version 1.2 (03/02/2015) NSMS Managed Firewalls Service Definition Understanding of a firewall service The function of any firewall service is to

More information

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems Chapter 9 The Internet: Information Technology Infrastructure for the Digital Firm 9.1 Prentice Hall Objectives 1. How does the Internet work? What are its major capabilities and benefits to business?

More information

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS WHITE PAPER Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS Emerging trend: SaaS and Online Applications for every market Software deployments are shifting from

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

ni.com Remote Connectivity with LabVIEW

ni.com Remote Connectivity with LabVIEW Remote Connectivity with LabVIEW What Is Remote Connectivity? Local Monitoring 3 Remote Mobile Access 4 What Is Remote Connectivity Two machines talking to one another Client Server PC PC Consumes Data

More information

THE E-COMMERCE EXTENSION FOR ERP

THE E-COMMERCE EXTENSION FOR ERP THE E-COMMERCE EXTENSION FOR ERP www.suite-ebusiness.com Create and deploy IT solutions for business Our research and development strategy: to be the most innovative IT solutions integrator Prodware s

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Understand the strategic arrangement of IS/IT in modern organisations. Week 3 IT Architecture and Infrastructure. Lecture objectives

Understand the strategic arrangement of IS/IT in modern organisations. Week 3 IT Architecture and Infrastructure. Lecture objectives IMS9043 IT in Organisations Lecture objectives Week 3 IT Architecture and Infrastructure Understand the strategic arrangement of IS/IT in modern organisations 1 2 Information Systems & People Information

More information

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content Unit Title: Information Systems Applications for Business Unit Reference Number: H/601/3904 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18 Learning Outcome 1 The learner will: Understand

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Taking a look at different types of e-commerce

Taking a look at different types of e-commerce World Applied Programming, Vol (1), No (2), June 2011. 100-104 ISSN: 2222-2510 2011 WAP journal. www.waprogramming.com Taking a look at different types of e-commerce Rania Nemat* Department of IT, Al-Azhar

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to: The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between

More information

Appendix C Network Planning for Dual WAN Ports

Appendix C Network Planning for Dual WAN Ports Appendix C Network Planning for Dual WAN Ports This appendix describes the factors to consider when planning a network using a firewall that has dual WAN ports. This appendix contains the following sections:

More information

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304

1) A complete SCM solution includes customers, service providers and partners. Answer: TRUE Diff: 2 Page Ref: 304 Enterprise Systems for Management, 2e (Motiwalla/Thompson) Chapter 11 Supply Chain Management 1) A complete SCM solution includes customers, service providers and partners. Diff: 2 Page Ref: 304 2) SCM

More information

L2F Case Study Overview

L2F Case Study Overview LF Case Study Overview Introduction This case study describes how one Internet service provider (ISP) plans, designs, and implements an access virtual private network (VPN) by using Layer Forwarding (LF)

More information