By Enas T' Ghandour - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

By Enas T' Ghandour

Description:

... want to send it through a communications medium to protect from ... SET is still not used widely over the internet mainly because it requires more overhead. ... – PowerPoint PPT presentation

Number of Views:68
Avg rating:3.0/5.0
Slides: 13
Provided by: nbadmini
Category:

less

Transcript and Presenter's Notes

Title: By Enas T' Ghandour


1
Module 3 Understanding E-Business Section 2
O-2-I Deconstruction
  • By Enas T. Ghandour

2
Deconstruction, what is it? Deconstruction is
the dismantling and reformulation of traditional
business structures i.e. breaking large
business into a collection of small businesses.
3
Example how newspaper work is threatened by the
Internet? A newspaper can be seen as a
collection of news reports, editorials,
advertising, crosswords, TV listings etc.
Internet can make news reports available for
anyone to read. It also can have sites dedicated
for classified ads. There are sites dedicated for
sports reviews and reports.
4
Conclusion The Internet can make any business
much cheaper and more accessible from the
public. Does this mean there will be no
newspapers in the future? Many newspapers have
adjusted to the situation by having a presence on
the internet and using its established name to
get revenue from online business ventures.
Also, reading a newspaper is almost a social
habit that many people practice which helps the
newspaper to overcome the e-business threat is
that.
5
techno-optimism and pessimism The
techno-optimist will feel that the internet is
going to have a profound effect on all aspects of
our lives and is going to drastically change the
way we live and conduct business. They also feel
that e-business will replace any other type of
business. The techno-pessimists feel that the
internet effect will be very minimal and might
just provide another minor venue for established
businesses Are you a techno-optimist or
pessimist?
6
  • The impact of the Internet on traditional
    business
  • Shopping becomes more of a social experience
    where shopping is not just based only on value
    there might be some joy involved in the shopping
    experience.
  • Shops become more specialized a certain shop
    will provide highly specialized products.
  • Shops become more service oriented, where it is
    possible to have human interaction for the
    consumer to get help in some questions he/she
    might have.
  • Shops use a hybrid approach where a shop might
    maintain a physical presence alongside an online
    presence.
  • Shops go online only in this case shops find it
    more sensible for their particular situation to
    have an online presence exclusively.

7
  • Limitations caused by Internet principles from
    the e-business perspective (problems with on-line
    transactions)
  • Lack of privacy any intermediate node in the net
    can view packets and in a sense listen to the
    conversation. So a credit card number can be
    caught and used (stolen).
  • Anonymity which means there is no real
    authentication (i.e. establishing your identity
    beyond reasonable doubt) so the merchant can be
    sure of the customer identity and the customer
    can be sure of the merchant identity.

8
How did e-business overcome those
limitations? By providing on-line security i.e.
by adding additional protocols to run on top of
the original protocols of the Internet such as
SSL and SET.
9
  • Encryption
  • This is and old techniques used in wars. It
    involves encoding your message whenever you want
    to send it through a communications medium to
    protect from falling into wrong hands, no one can
    understand it except the person who has the key
    to decode (decrypt) the message.
  • What do you need for encryption process?
  • The encryption process should be complex enough
    to make the encoded message difficult for
    unauthorized users to decrypt i.e. break the
    code.
  • The intended receiver/receivers should be able to
    decrypt that message back to it original format.
    Furthermore, the process of decryption needs to
    be efficient.
  • The key(s) used for encryption and decryption
    should themselves be secure.

10
  • Symmetrical and asymmetrical encryption
  • Symmetrical encryption was the first to be used
    and the concept there was that the key used for
    encrypting the message is the same as the key
    used for decrypting it.
  • Asymmetrical encryption is a method of encryption
    where the key used for encrypting a message is
    different from the key used to decrypt the same
    message. This type is used in e-business since
    it provides a way of authentication where a
    public key is used for encoding and decoding in
    the customer side and a private key is used for
    decoding and encoding messages on the merchant
    side.

11
  • Protocols for online security for e-business
  • Secure Socket Layer (SSL)
  • The Secure Electronic Transaction (SET) which is
    a more recent protocol mainly advocated by banks
    and credit card issuers. It allows for more
    authentication of the user of the credit card
    since it requires that each participant should
    get what is called a digital certificate. SET is
    still not used widely over the internet mainly
    because it requires more overhead.

12
Exercise Do the exercise titled looking at
richness and reach in subsection 2.6 of the
course website Must Read Section 2 of the
course web site and Chapter 4 of the set book.
References Most of the material in this
section is from the course website section 2 and
the set book blown to bits .
Write a Comment
User Comments (0)
About PowerShow.com