| A | B |
| E-commerce | Combination of communications, data management, and security capabilities that allows organizations to exchange information about the sale of goods and services. |
| B2B E-commerce model | High volume / low price margins - expected to reach $137 billion by 2000. |
| B2C E-commerce model | Low volume / high price margins - expected to reach $10 billion by 2000 |
| Areas of liability in e-commerce | Copyright, trademark and patent. Privacy and confidentiality. Jurisdictional issues |
| On-Line Copyright Infringement Liability LImitation Act | Exempts online providers from liabiltiy for direct infringement |
| No Electronic Theft Act | Financial gain to include the receipt of anything of value |
| Digital Millennium Copyright Act | Allows US laws to conform to WIPO treaties for international standards - Anticircumvention, Copyright management information protection, service provider immunity, licensing of webcasting |
| World Intellectual Property Organization | Promote technology sharing among member companies. Administers Berne Treaty and the Paris Convention |
| Cash model | Uses real money to buy digital money (placed in a "wallet") then using digital money to purchase. |
| Advantages of cash model | Immediate funds transfer, (no back-end processing). No transaction cost. Anonymity. |
| Check model | Digitally encrypted checks presented for payment. Verified by merchant. |
| Credit card model | Accept credit card numbers. Ver |
| Symmetric encryption | Secure, encrypted communication where both parties encrypt using a single, secret key. Types include DES, Triple DES, Skipjack, Blowfish, RC2, RC4, and RC5 |
| DES (Data Encryption Standard) | Symmetric encryption type - 56 bit key, 19 stages - Cracked by brute force attack |
| Triple DES | Symmetric encryption using two 56 bit keys |
| Skipjack | Symmetric encryption using NSA Algorithm, 80-bit key and a 64-bit 32 round block cipher |
| IDEA (International Data Encryption Alogrithm) | Symmetric encryption using block cipher, 128-bit key operates on 64-bit plaintext blocks in eight iterations |
| Blowfish | Symmetric encryptions using variable length key, maximum of 448-bit. Developed by Bruce Schneier. |
| RC2 | Symmetric encryption using 64-bit cipher with variable key length |
| RC4 | Symmetric encryption using variable key length, but no division of plaintext into blocks. Code was posted to Internet in 1994 |
| RC5 | Symmetric encryption using paramertized system. Block size, key length, and number of rounds may all be changed. Basically a block cipher, but can be streamed |
| Asymmetric Encryption | Public-Key/Private-Key encryption. Messages encrypted with Public Key can only be decrypted with Private-Key and visa-versa. |
| RSA (Rivest, Shamir, Adleman) | Standard ASymmetric Encryption type. Uses 512 bit keys or better |
| Advantage of Asymmetric over Symmetric encryption | No need for secure channel |
| One-Way Encryption | Easy to encrypt, impossible to decrypt - Passwords and PINs |
| Message Digests (Hash Encryption) | Provides for message authenticity. Alogrithm creates short message from long one for comparison at receiving end |
| SET (Secure Electronic Transaction) | Current standard payment plan for Internet transactions. Specifies the subset of dialogues between customer and merchant, and between the merchant and the payment gateway |
| SSL (Secure Sockets Layer) | Secures the transport layer (TCP). Encrypts information to prevent unauthorized disclosures, authentication provides for proof of both parties, and reliability proves non-alteration of message |
| Requirements for SSL communication | Client must support https. Server must have certificate. |
| S/MIME | Adds security to e-mail through the use of digital signatures and encryption. Assumes both sender and receiver have public/private key pairs |
| OBI (Open Buying on the Internet) | Used in B2B for high volume, low price transactions. Id's the purchaser, validates authorized spending limits before purchase completion. |
| OTP (Open Trading Protocol) | B2B or B2C - Uses XML. Defines trading protocol options, which control how the trade occurs and what payment options are available |
| EDI (Electronic Data Interchange) | Designed to be the standard for digital document exchange between organizations. Not widely used due to proprietary implementations and cost. |
| Examples of Hard Goods | Books, clothes, digital cameras |
| Examples of Soft Goods | Shareware, e-published documents, Mpegs |
| Examples of Services | Tickets, Market trades |
| Planning Phase | First phase of story board process. Plots the look, feel and function of the site |
| Hardware Phase | Second phase of storyboard process. Decisions involve type and placement of required hardware |
| E-commerce Archetypes | Make e-commerce feel more like traditional commerce. Examples - Shopping Carts, Advertising, Subscriptions |
| Maintenance, Security, Performance monitoring | Functions of a webmaster |
| MMC, Web Based, Command line | Site Server Commerce Edition Administration Methods |
| Install payment software and provide online merchant account information | Must be provided to Site Server Commerce Edition to complete configuration of online payments. |