TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches.

Similar documents
Lectures for the course: Electronic Commerce Technology (IT 60104)

ebusiness & ecommerce

Electronic Payments Part 1

Chapter 10. e-payments

Electronic Payments. EITN40 - Advanced Web Security

An Introduction to Cryptography as Applied to the Smart Grid

Electronic Payment Systems. Traditional Methods

E-Commerce Project Management Implementation Phd. Ion Ivan, Saha Priyatosh, Asist. Cristian Toma

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

4 Electronic Payment Systems

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

Wireless Mobile Internet Security. 2nd Edition

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

Introduction to E-commerce

Network Security Protocols

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Electronic Cash Payment Protocols and Systems

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Evaluate the Usability of Security Audits in Electronic Commerce

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

IT Networks & Security CERT Luncheon Series: Cryptography

Certified E-commerce Consultant (CEC)

CRIPT - Cryptography and Network Security

Key Management (Distribution and Certification) (1)

About the Authors Preface Acknowledgements List of Acronyms

Client Server Registration Protocol

7 Electronic Payment Systems

The e-payment Systems

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Internet Part 2. CS/MIS Department

Key & Data Storage on Mobile Devices

Ciphire Mail. Abstract

CRYPTOGRAPHY IN NETWORK SECURITY

CSE/EE 461 Lecture 23

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

SSL A discussion of the Secure Socket Layer

Secure web transactions system

1.Because e-commerce is ubiquitous it reduces A. marketspace. B. transaction costs. C. dynamic pricing. D. price discrimination.

III B.Com. (International Business) [ ] Semester: V Core: Practices of E-Business 517B Multiple Choice Questions.

Guide to Data Field Encryption

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Variorum, Multi- Disciplinary e-research Journal Vol.-01, Issue-IV, May 2011

Entrust Smartcard & USB Authentication

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Table of Contents. Bibliografische Informationen digitalisiert durch

Electronic Commerce and E-wallet

Module 1: e- Learning

Cryptography and Network Security: Summary

Chapter 8. Network Security

PrivyLink Cryptographic Key Server *

How To Pay With Cash Or Credit Card (For Women)

VoteID 2011 Internet Voting System with Cast as Intended Verification

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Securing Your Sensitive Data with EKM & TDE. on SQL Server 2008/2012

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

AD CS.

Secure Mobile POS System

The Definition of Electronic Payment

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Cyberica.NET Technologies E-Retailing Solutions Enabling Innovation as a growth driver for Enterprise of Tomorrow

Information Security and Cryptography

Master s Program in Information Systems

E-commerce Project Management

Information and Communications Technology Courses at a Glance

ELECTRONIC COMMERCE WORKED EXAMPLES

Associate Prof. Dr. Victor Onomza Waziri

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Chapter 11: E-Commerce

Electronic Payment Systems

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

Electronic Payment Systems on Open Computer Networks: A Survey

Using etoken for SSL Web Authentication. SSL V3.0 Overview

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Information Security

Smart Card Application Development Using Java

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

How To Encrypt Data With Encryption

Security Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Security: Focus of Control. Authentication

Overview. SSL Cryptography Overview CHAPTER 1

BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1

Index. BIOS rootkit, 119 Broad network access, 107

Transcription:

TABLE OF CONTENTS Chapter 1 INTRODUCTORY THE FOUNDATION OF E & M 1. Conceptual Analysis of E-Commerce. 2. Objective of Study. 3. What is M-Commerce. 4. E-Commerce & M-Commerce Technologies. 5. Scope of Study : (a) Coverage. (b) Key Concepts. (c) Internet Based Research Approaches. (i) (ii) (iii) (iv) E-Experiment. E-Focus Group. E-Observation. E-Interviews. (d) On line Survey Research : (i) (ii) E-mail Survey. Web Survey. 6. Limitations of Study. 7. Plan of Study. 1

Chapter 2 E & M TECHNOLOGY TRENDS 1. E-Commerce Models. (a) B2C Model. (b) B2B Model. (c) G2B Model. (d) C2G Model. 2. M-Commerce Technology. (a) Displaying Large Images. (b) Presentation of abstract information s. (c) Presentation of Compound Information s. (d) Adoption of 3G Technique. 2

Chapter 3 DIGITAL BUSINESS A NEW GENERATION OF BUSINESS 1. Digital Watermarking. (a) History Watermarking. (b) Digital Watermarking Methodology. (c) Watermarking Applications. (d) Classification of Digital Watermarking. (e) Attacks on Digital Watermarking. (f) Problems of Digital Watermarking. 2. Digital Rights Management. (a) Existing Framework for DRM. (b) Future Issues of Digital Rights Management. 3. Hotel Management (a) Aspects of Internet use in Hotels. (b) Internet Benefits. (c) Internet Difficulties. 3

Chapter 4 CUSTOMER RELATIONSHIP MANAGEMENT STRATEGIES 1. Meaning of Customer Relationship. 2. E-CRM. 3. M-CRM. 4. Relationship between E-CRM and M-CRM. 5. The Customer Profile. 6. Managing Customer Profile. 7. Managing and sharing Customer Data. 8. Management of Service Agreement. 9. Choosing Right CRM Strategy. 10. Resetting CRM Strategy. 11. Analytical Framework of CRM strategies on Internet & Mobile Channels. (a) Customer Loyalty in CRM. (b) Branding in CRM. (c) Customer Satisfaction in CRM. (d) Customization in CRM. (e) Trust in CRM. 12. Implementation of Analytical Framework in E-CRM an M- CRM. 4

Chapter 5 PAYMENTS TRENDS 1. Payments Life line of business. 2. Current Payment system. a. Cash Payments. b. Bank Payment. i. Payment by Check. ii. Payment through Credit Transfer. iii. Payments through Clearing House. iv. Wire Transfer Services. c. Payment through Payment Cards. d. Consumer Preference in Payment Systems. 3. Requirements for payments systems. a. Fraud Prevention. b. Confidentiality c. Fault Tolerance. 4. Properties of Payments. a. Small and Low Value Payments. b. Divisibility. c. Transferability. d. Offline Usability. e. Financial Status Transparency. f. Cost Efficiency. 5

Chapter 6 FUTURE PAYMENT TECHNOLOGY 1. E-Payment Technology. 2. Cryptographic Techniques. (a) Encryption and Decryption. (b) Symmetric encryption. (c) Message digesting. (d) Kerberos. (e) Asymmetric Encryption. (f) Digital Signatures. (g) RSA. (h) Elliptic Curve Cryptography. (i) Public Key Infrastructure (j) Transport of Security Informations. (k) Dual Signatures. (l) Nonces. (m) Blind Signatures. (n) Smart Cards. 3. Credit Card Based System. (a) MOTO Transactions. (b) Unsecured Network Payments. (c) Virtual Cards. (d) Once Credit Card Number System. (e) I-Key Protocol. (f) Secure Electronic Transactions. 4. Electronic Checks and Account Transfers. 6

Chapter 7 E-CASH, MICRO-PAYMENT AND MOBILE PAYMENT SYSTEM 1. E Cash Systems. (a) Project CAFÉ. (Conditional Access for Europe). (b) Net Cash. (c) Mondex. (d) EMV Cash Cards. (e) Smart-Axis. 2. Micro-Payment System. (a) Millicent. (b) Subscript. (c) Pay world. (d) Hash Cahin Trees. (e) Micro-mint. (f) Probability based Micro-Payments. (g) Others. 3. Mobile Payments. (a) Mobile Internet Architectures. (b) Mobile Network Operator as Bankers. (c) Credit Card Based System. 7

Chapter 8 IMPACT OF E-COMMERCE AND M-COMMERCE TECHNOLOGIES ON DEVELOPING COUNTRIES 1. The Life Cycle of Technology Adoption. 2. Nature of the demand of M-Technologies. 3. The Wireless Hype Cycle. 4. Business Models for Mobile Technology. (a) Value Chain. (b) The Village Mobile Phone Programe. (c) Tele-centers and Community Access. (d) Workers Migration. 5. Development due to introduction of New Technology. (a) Social Development. (b) Political Development. 8

Chapter 9 CONCLUSION & SUGGESTIONS 1. Summary. 2. Findings. 3. Search for better Results. 4. Suggestions for Improvement. 9