SlideShare uma empresa Scribd logo
1 de 20
CONFIDENTIAL Copyright © 2001 by Marketspace LLC Chapter 3 Lecture Slides The Basics of Doing  Business on the Internet Rayport, Jaworski Intro to e-Commerce Exhibits and Tables
The Basics of Doing Business on the Internet  — Today’s Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 3: The Basics of Doing Business on the Internet  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Chapter 3: The Basics of Doing Business on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Table 3–1: Bandwidth Types Source:  http://bandwidth.about.com/industry/bandwidth/library/blbwquickreference.htm
Table 3–2: Data Powers of Ten Note: These numbers are approximate and are simplified for illustrative purposes.  A kilobyte is actually 1,024 bytes; a megabyte is 1,024 kilobytes; a gigabyte is 1024 megabytes. The remaining terms are scaled accordingly. Source:  Williams, Roy.  Center for Advanced Computing Research, California Institute of Technology.  “Data Powers of Ten.”  http://www.cacr.caltech.edu/~roy/dataquan/.
Exhibit 3–1: E-commerce Hosting: Development Server, Staging Server, Production Server High-bandwidth connection Co-Location Facility Developmental server Staging server Production server Production server Production server Production server Internet
Chapter 3: The Basics of Doing Business on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exhibit 3–2: EBay User Interface EBay has a very simple user interface that features plain text.
Exhibit 3–3: Gartner User Interface Gartner employs a relatively advanced user interface that includes elements of interactivity and advanced graphics.
Exhibit 3–4: Yahoo User Interface My Yahoo uses templates to let users customize the look and feel of their pages. These templates allow Yahoo to display content in a variety of formats.
Chapter 3: The Basics of Doing Business on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exhibit 3–5: Lands’ End Customer Support Lands’ End uses a chat tool to provide quick and inexpensive customer support.
Exhibit 3–6: Buy.Com Customer Login Screen
Chapter 3: The Basics of Doing Business on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Exhibit 3–7: Digital Certificate Transmission Trusted third-party certificate provider 1. Digital certificate / public key and private key sent to server (when server is initially set up) Customer’s PC 4. Certificate used to encrypt data 5. Encrypted data sent to server via internet 6. Private key used to decrypt data 7. Server stores and processes credit card data Web server with private key 2. Copy of public key is sent to customer’s PC.  Customer accepts this certificate to create SSL “pipe” between user’s PC and server = non-SSL transmission = SSL transmission 3. Encryption “tunnel” created Note:  Step 3 indicates the creation of an SSL encryption  “tunnel” for data to pass through.  Steps 4 through 7 show what happens behind the scenes in SSL. Internet Credit  card  information VISA ****************** Encrypted credit card  Information ****************** Credit  card  information VISA ****************** Encrypted credit card  Information ******************
Exhibit 3–8: Digital Signature Authentication Trusted third-party certificate provider 1. Digital certificate / public key sent to customer Customer’s PC 4. Public key / certificate used to decrypt digital signature Web server with private key Internet 5. User is presented with digital-signature information. If user accepts certificate, SSL tunnel is created. 2. Private key encrypts digital-signature document 3. Encrypted signature sent Encrypted digital  signature ****** ************ Digital  signature ABC Corp. ************ Digital  signature ABC Corp. ************ Encrypted digital  signature ****** ************
Exhibit 3–9: Fulfillment Order Processing Systems Potential Partners Internal  Accounting Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Procurement Systems Potential Partners ,[object Object],[object Object],[object Object],Shipping Systems Potential Partners Returns Systems Potential Partners ,[object Object],[object Object],[object Object],Picking / Pricing Systems Potential Partners ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Product Information exchange Integrating multiple partners, technologies and systems is a major challenge.
Chapter 3: The Basics of Doing Business on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion: The Basics of Doing Business on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

E-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEE-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEDr. Abzal Basha H S
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web TechnologyShuvo Malakar
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web TechnologyArun Kumar
 
Cloud computing simplified...
Cloud computing simplified...Cloud computing simplified...
Cloud computing simplified...saili mane
 
Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Jonathan Jeon
 

Mais procurados (8)

E-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVEE-BUSINESS in INDIAN PERSPECTIVE
E-BUSINESS in INDIAN PERSPECTIVE
 
History of Web Technology
History of Web TechnologyHistory of Web Technology
History of Web Technology
 
Introduction To Web Technology
Introduction To Web TechnologyIntroduction To Web Technology
Introduction To Web Technology
 
Cloud computing simplified...
Cloud computing simplified...Cloud computing simplified...
Cloud computing simplified...
 
Ecomerce presentation
Ecomerce presentationEcomerce presentation
Ecomerce presentation
 
Online banking
Online bankingOnline banking
Online banking
 
Web Technology and Standards Tutorial
Web Technology and Standards Tutorial Web Technology and Standards Tutorial
Web Technology and Standards Tutorial
 
05
0505
05
 

Destaque

SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...
SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...
SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...webhostingguy
 
Getting Started With Windows Shared Hosting
Getting Started With Windows Shared HostingGetting Started With Windows Shared Hosting
Getting Started With Windows Shared Hostingwebhostingguy
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...webhostingguy
 
C O M P E T I T I V E A N A L Y S I S
C O M P E T I T I V E A N A L Y S I SC O M P E T I T I V E A N A L Y S I S
C O M P E T I T I V E A N A L Y S I Swebhostingguy
 
Week 7: Space group examples
Week 7: Space group examplesWeek 7: Space group examples
Week 7: Space group exampleswebhostingguy
 

Destaque (6)

SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...
SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...
SPECIAL CONDITIONS FOR WEBSITE HOSTING SERVICES ON A ...
 
Getting Started With Windows Shared Hosting
Getting Started With Windows Shared HostingGetting Started With Windows Shared Hosting
Getting Started With Windows Shared Hosting
 
Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...Secure Web Servers Protecting Web Sites That Are Accessed By ...
Secure Web Servers Protecting Web Sites That Are Accessed By ...
 
C O M P E T I T I V E A N A L Y S I S
C O M P E T I T I V E A N A L Y S I SC O M P E T I T I V E A N A L Y S I S
C O M P E T I T I V E A N A L Y S I S
 
Week 7: Space group examples
Week 7: Space group examplesWeek 7: Space group examples
Week 7: Space group examples
 
Slides
SlidesSlides
Slides
 

Semelhante a IECch03.ppt

E Commerce
E CommerceE Commerce
E Commercejroloff
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionAustina Francis
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7koolkampus
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier ArchitectureWebx
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyMohammad Salehin
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology EssayPamela Wright
 
Dc OCFO SOA/ESB Success Story - FTA 2010
Dc OCFO SOA/ESB Success Story - FTA 2010Dc OCFO SOA/ESB Success Story - FTA 2010
Dc OCFO SOA/ESB Success Story - FTA 2010Sonny Hashmi
 
Ibm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsIbm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsChristophe Begue
 
Bba401 e-commerce
Bba401  e-commerceBba401  e-commerce
Bba401 e-commercesmumbahelp
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...Sutedjo Tjahjadi
 
Web Locker For Online Banking System Chapter final project Report page
Web Locker For Online Banking System  Chapter final project Report pageWeb Locker For Online Banking System  Chapter final project Report page
Web Locker For Online Banking System Chapter final project Report pageMukesh Chaudhary(L.I.O.N)
 

Semelhante a IECch03.ppt (20)

Ecommerce_Ch3.ppt
Ecommerce_Ch3.pptEcommerce_Ch3.ppt
Ecommerce_Ch3.ppt
 
Chap03
Chap03Chap03
Chap03
 
E Commerce
E CommerceE Commerce
E Commerce
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 
E commerce 5_units_notes
E commerce 5_units_notesE commerce 5_units_notes
E commerce 5_units_notes
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Chapter 3 .pptx
Chapter 3 .pptxChapter 3 .pptx
Chapter 3 .pptx
 
Putting your practice on cloud 9
Putting your practice on cloud 9Putting your practice on cloud 9
Putting your practice on cloud 9
 
3 Tier Architecture
3  Tier Architecture3  Tier Architecture
3 Tier Architecture
 
security.ppt
security.pptsecurity.ppt
security.ppt
 
Ecommerce_Ch3.ppt
Ecommerce_Ch3.pptEcommerce_Ch3.ppt
Ecommerce_Ch3.ppt
 
Bit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currencyBit taka bangladeshi country owned crypto currency
Bit taka bangladeshi country owned crypto currency
 
E-Business And Technology Essay
E-Business And Technology EssayE-Business And Technology Essay
E-Business And Technology Essay
 
Ecom
EcomEcom
Ecom
 
Dc OCFO SOA/ESB Success Story - FTA 2010
Dc OCFO SOA/ESB Success Story - FTA 2010Dc OCFO SOA/ESB Success Story - FTA 2010
Dc OCFO SOA/ESB Success Story - FTA 2010
 
Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
Ibm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutionsIbm blockchain summit tokyo sep 11 2019 industrial solutions
Ibm blockchain summit tokyo sep 11 2019 industrial solutions
 
Bba401 e-commerce
Bba401  e-commerceBba401  e-commerce
Bba401 e-commerce
 
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...Indonesian e-Commerce requires Scalability,  Reliability and Security to Achi...
Indonesian e-Commerce requires Scalability, Reliability and Security to Achi...
 
Web Locker For Online Banking System Chapter final project Report page
Web Locker For Online Banking System  Chapter final project Report pageWeb Locker For Online Banking System  Chapter final project Report page
Web Locker For Online Banking System Chapter final project Report page
 

Mais de webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

Mais de webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

IECch03.ppt

  • 1. CONFIDENTIAL Copyright © 2001 by Marketspace LLC Chapter 3 Lecture Slides The Basics of Doing Business on the Internet Rayport, Jaworski Intro to e-Commerce Exhibits and Tables
  • 2.
  • 3.
  • 4.
  • 5. Table 3–1: Bandwidth Types Source: http://bandwidth.about.com/industry/bandwidth/library/blbwquickreference.htm
  • 6. Table 3–2: Data Powers of Ten Note: These numbers are approximate and are simplified for illustrative purposes. A kilobyte is actually 1,024 bytes; a megabyte is 1,024 kilobytes; a gigabyte is 1024 megabytes. The remaining terms are scaled accordingly. Source: Williams, Roy. Center for Advanced Computing Research, California Institute of Technology. “Data Powers of Ten.” http://www.cacr.caltech.edu/~roy/dataquan/.
  • 7. Exhibit 3–1: E-commerce Hosting: Development Server, Staging Server, Production Server High-bandwidth connection Co-Location Facility Developmental server Staging server Production server Production server Production server Production server Internet
  • 8.
  • 9. Exhibit 3–2: EBay User Interface EBay has a very simple user interface that features plain text.
  • 10. Exhibit 3–3: Gartner User Interface Gartner employs a relatively advanced user interface that includes elements of interactivity and advanced graphics.
  • 11. Exhibit 3–4: Yahoo User Interface My Yahoo uses templates to let users customize the look and feel of their pages. These templates allow Yahoo to display content in a variety of formats.
  • 12.
  • 13. Exhibit 3–5: Lands’ End Customer Support Lands’ End uses a chat tool to provide quick and inexpensive customer support.
  • 14. Exhibit 3–6: Buy.Com Customer Login Screen
  • 15.
  • 16. Exhibit 3–7: Digital Certificate Transmission Trusted third-party certificate provider 1. Digital certificate / public key and private key sent to server (when server is initially set up) Customer’s PC 4. Certificate used to encrypt data 5. Encrypted data sent to server via internet 6. Private key used to decrypt data 7. Server stores and processes credit card data Web server with private key 2. Copy of public key is sent to customer’s PC. Customer accepts this certificate to create SSL “pipe” between user’s PC and server = non-SSL transmission = SSL transmission 3. Encryption “tunnel” created Note: Step 3 indicates the creation of an SSL encryption “tunnel” for data to pass through. Steps 4 through 7 show what happens behind the scenes in SSL. Internet Credit card information VISA ****************** Encrypted credit card Information ****************** Credit card information VISA ****************** Encrypted credit card Information ******************
  • 17. Exhibit 3–8: Digital Signature Authentication Trusted third-party certificate provider 1. Digital certificate / public key sent to customer Customer’s PC 4. Public key / certificate used to decrypt digital signature Web server with private key Internet 5. User is presented with digital-signature information. If user accepts certificate, SSL tunnel is created. 2. Private key encrypts digital-signature document 3. Encrypted signature sent Encrypted digital signature ****** ************ Digital signature ABC Corp. ************ Digital signature ABC Corp. ************ Encrypted digital signature ****** ************
  • 18.
  • 19.
  • 20.