Title: Electronic Commerce Technology
1Electronic Commerce Technology
- Patrick McKeown
- Professor and Head
- Dept of MIS, Terry College of Business
2Todays Topics
- Electronic commerce infrastructure
- Electronic commerce technology problems and
solutions - The HTTP protocol
- Counting visitors
- Creating a shopping cart
- Electronic commerce security and payment systems
3Infrastructure
4Electronic Commerce Infrastructure
5Global Information Infrastructure Layer
- Global information infrastructure (GII) layer -
composed of various national information
infrastructures, in which some components may
differ depending on the country
Can you use yours in Europe?
6National information infrastructure (NII)
- communication networks and protocols, including
- satellite and cable television networks
- telephone networks
- mobile communication systems
- computer networks
- EDI and Internet protocols (TCP/IP)
7Message Distribution Infrastructure Layer
- The software layer of electronic commerce that
sends and receives messages. - Electronic Data Interchange (EDI)
- E-mail (SMTP)
- File Transfer Protocol (FTP)
- Hypertext Transfer Protocol (HTTP) The Web
8Electronic Publishing Infrastructure Layer
- Permits organizations to publish text and
multimedia over the message distribution
infrastructure. - Messages are composed in Hypertext Markup
Language (HTML) - Associated multimedia files are linked to the
message - Includes the uniform resource locator (URL),
which uniquely identifies any Web server
9Some HTML
Welcome to FarEast
Foods
Select a country China/a
Japan
href"china.html"Korea
href"china.html"Thailand
href"china.html"Vietnam
Thanks
and enjoy your food!
10Business Services Infrastructure Layer
- Software layer that handles the services required
to support business transactions - encryption
- decryption
11Electronic Commerce Layers
- Electronic Commerce Application Layer
- transactions take place in this part of the
electronic commerce infrastructure - Catalogs of books and CDs
- Listings of automobiles
12Electronic Commerce Infrastructure for DVD
Distributor
13Client/Server Model for Electronic Commerce
14Web-Based Electronic Commerce
- Process begins with the customer finding a Web
site - URL of an electronic commerce site is sent over
the Web - User receives one or more Web pages
- User makes a purchase from the Web
- Process ends with customer receiving verification
of order
15Finding Web Sites with Search Sites
- Computer-driven search sites
- Search engines
- Spiders
- eg, Google
- Human-indexed search sites
- Humans create categories
- Humans add sites to categories
- eg, Yahoo, MSN
16Use of Search Engine Spider
17Transacting an Order over the Web
Web server
Browser sends URL
Database server
18Transacting an Order over the Web
Web server
1. Browser sends URL
2. Server returns HTML
Database server
19Transacting an Order over the Web
Web server
1. Browser sends URL
2. Server returns HTML
3. Browser sends data
Database server
20Transacting an Order over the Web
Web server
1. Browser sends URL
2. Server returns HTML
3. Browser sends data
4. Server processes data using database
Database server
21Transacting an Order over the Web
Web server
1. Browser sends URL
2. Server returns HTML
3. Browser sends data
5. Server sends confirmation
4. Server processes data using database
Database server
22Client and Server-Side Processing
- Client-side processing- on the browser
- Applets- Java app on browser
- Server-side processing- on the server
23Server-Side Processing using CGI
24Microsoft or Open-Source Web Server
- Open-source software - software that is created
and supported by volunteers who make it freely
available to users who can then add personally
desired features - Apache Web server software - runs 60 of Web
servers and is an open-source software similar to
Linux - Microsoft IIS - developed by Microsoft and has
close to 30 of the Web server market
25Electronic Commerce Technology Problems and
Solutions
26Problems ... and solutions
- The Internet and Web
- The HTTP protocol
- Counting visitors
- Creating a shopping cart
27The Internet
- Can be thought of as a Network of Networks
- Created in 1969 by a consulting company to
connect universities - Enabled researchers to use computers at other
universities - Insecure
- Was NOT created as a way to send messages in time
of nuclear war - Was NOT invented by Al Gore
28Internet Protocol
- Protocol an agreement about how messages will be
sent - TCP/IP the Internet protocol
- universal agreement so no need for a central
computer - not very secure
- Packet switching used to send messages
- messages broken up into packets each with an
address and sequence number - all make their way to destination computer
separately
29The World Wide Web
- The Web software, protocols and conventions
based on hypertext and multimedia that make the
Internet easy to use and browse - Invented by Tim Berners-Lee
- Sends data as plain text with tags
- Browser then formats data using the tags
- Very low overhead since only plain text is being
sent - Uses hypertext and multimedia
30Advantages of the HTTP Protocol
- Modest amount of code
- Efficient linking
- Works regardless of previous operations
- Unrestricted set of formats
- Some privacy built in
31Problems with the HTTP Protocol
- Session a client/server protocol in which a
continuous sequence of transactions occurs
between client and server - HTTP is a Stateless protocol
- No memory of previous visit
- No real session exists
- Causes problems with
- Counting
- Shopping
32Counting Web Site Visitors
- Why count Web site visitors?
- Indicates how good the site is at attracting
visitors - Used to determine rate charged advertisers on
site - Indicates audiences served by Web site
- HTTP does not handle counting unique visits to a
Web site - Visitors who come from behind a firewall, a
dial-up, or cable ISP can not be accurately
counted - Dynamic IP address allocation
33Using Cookies for Counting Visitors
- A cookie is information that a Web site stores on
a computers hard drive to enable it to identify
the computer at a later time. - Session cookie - a cookie that exists only during
the current series of interactions between the
browser and Web server. - Persistent cookie - a file that exists
indefinitely on the users hard disk and that the
browser uses to identify the user to the
corresponding Web site.
34Cookie for Amazon.com
35Using Cookies for Counting
- First time user visits a Web site, they are
assigned a cookie - Each subsequent time user visits Web site, they
cookie is used to identify them as a unique visit - Firewalls and ISP dynamic IPs dont effect the
counting using cookies
36Using a Cookie to Count
37Passing Cookies
- Cookies are passed through the URL
Used to recognize me
My cookie at Amazon.com
38Problems with shopping using the Web
- Since the HTTP (Web) protocol is stateless, it
forgets you! - Web site would not recognize you on multiple
visits to the same shopping site - This is true even if you are just trying to
purchase an item and then check out - It is also true if you are trying to purchase
multiple items
39Solution to shopping problems
- Use a session cookie so the Web site remembers
you between visits - Link a session cookie to each item purchased and
put in a virtual shopping cart - At checkout, it is used to retrieve those items
you have purchased and sum their costs
40Use of a Cookie for Electronic Shopping Cart
41Securing Electronic Commerce Transactions
- Consumers remain afraid to use electronic
commerce - Because the intent of the Internet is to give
remote access to information, it is inherently
open - The same technologies that form the basis of
electronic commerce can be used to attack
computer systems - Server security is generally not easy to breach
42Encryption
- Encryption - the conversion of readable text into
characters that disguise the original meaning of
the text - Decryption - the conversion of an encrypted,
seemingly senseless character string into the
original message - Key - an algorithm used to encode and decode
messages - Encryption systems public key and private key
43Public-Key Encryption
- An public key encryption system with two keys -
one private and one public - Public key - in a public-key encryption system,
this is the key that is freely distributed to
encrypt messages - Private key - in a public-key encryption system,
this is the only key that can decrypt the message
44Public-Key Encryption
45Message Before Encryption
46Message After Encryption
47Another approach Steganography
Steganography hiding messages or images in
other, unrelated images
48Digital Signatures
- Digital Signature - a digital code that is
attached to an electronically transmitted message
and that uniquely identifies the sender
49Message Before Signing
50Digitally Signed Message
51Electronic Payment Systems
- Electronic Funds Transfer (EFT) - any transfer of
funds from one account to another without paper
money changing hands - Digital cash - the storage of value in a digital
format in one of two broad forms - Card-based digital cash - the storage of value on
a plastic card, such as a prepaid telephone card
or a smart card, that can have value added to or
removed from it. - Computer-based digital cash - the storage of
value on a computer, usually linked to the
Internet, allowing for payment directly between
the customer and merchant computers or for a
transfer of funds between individuals
52Characteristics of Electronic Money
53Use of EFT for a Credit Card Purchase
54Use of Digital Cash for Individual Purchase