meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77

Join the forum, it's quick and easy

meo786
Welcome to meo786
Please Log In and Enjoy with us. I hope you will find more "Fun With Mobile, Computer & Management"

Thanks.

Muhammad Afzal Meo
+092 333 497 62 77
meo786
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Old IT430 E-Commerce Assignments

Go down

Old IT430 E-Commerce  Assignments Empty Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 1:20 pm

Total Marks: 20
INSTRUCTIONS

1. You are allowed to consult the online material in preparation of this assignment.
2. Do not copy and paste. Copy(From handouts, some website or form any other source like copy from some other student) and pasted material from any source will be awarded zero marks.
3. Please use a 12-point font in Times New Roman or Arial.
4. The Assignment includes Lecture # 20 to Lecture # 27.
5. Last date for the Submission of the assignment is June 30th , 2008.
6. Upload your assignment within due date and time and Assignment will not be accepted via Email. No assignment will be accepted after the due date and time.
Objectives
• Familiarizing the students with Security Issues on Internet (E-commerce security Issues) and impact on Business.
• Encourage and stimulate students to Identify Ecommerce threats and vulnerabilities.

QUESTION # 01

a) As an IT Specialist Identify E-commerce hidden or potential hurdles? Explain briefly each hurdle or pitfall under headings.(10)
b) How you eliminate risk(in ECommerce process) by reducing various threats and vulnerabilities ? Explain briefly under headings.(10)


NOTE:
Explanation under heading will not increase more than 4 to 5 lines. Avoid writing irrelevant and unnecessary material.


Last edited by Admin on Thu Jan 21, 2010 7:46 am; edited 1 time in total

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 1:39 pm

HURDULES IN E - COMMERCE

electronic-commerce solutions face many hurdles, including helping clients upgrade their infrastructure.

challenges are increasing system performance to handle a more intense E-commerce load and simplifying the consumer experience, said Sean Maloney, Intel Corp. senior vice president, during a keynote presentation at the E-Business Expo, here. Building and deploying an E-commerce site, whether it is a business-to-business infrastructure or a consumer E-commerce site, will not be easy, said Maloney.

Setting up a business-to-business site means developing a robust system able to handle vigorous traffic and provide foolproof security, said Maloney. VARs must make sure clients using the site can get information and place orders quickly, regardless of their internal computer foundation, he said.

"In business-to-business, the supplier owns all the problems," Maloney said.

When Intel, Santa Clara, Calif., launched its business-to-business services in January last year, site developers studied client LAN infrastructures, ISP capabilities and the average number of components on an Internet page to make sure the site would service all of its accounts efficiently, Maloney said. Today, Intel generates about $1 billion per month through Internet business-to-business services, he said.

As business-to-business transactions mature, there will be intelligent agents and integrated applications automatically updating the information a customer needs to do day-to-day business, Maloney said.

For example, component ordering could be completely automated for manufacturers, Maloney said. Business-to-business links for suppliers would keep a steady stream of pricing and availability coming in, which would automatically update in a spreadsheet, he said.

On the consumer side, E-business will need to be expanded to provide a similar set of services but in a more simplified fashion.
"The challenge for E-business for the consumer client is that the experience has to be very simple, easy to use, and it has to be compelling enough to get the user to stay on the Web," Maloney said.

Over the next few years, more information and transactions will be completed over the Internet using voice recognition. In addition, more products will be presented in 3-D with live sound and other descriptions, he said.

If that sounds far-fetched given the computing power of mainstream users and today's 56-Kbit-per-second world, PC performance will increase, as will bandwidth, Maloney said.

Both business-to-business and consumer E-commerce site builders need to consider load carefully when implementing sites, Maloney said.

Maloney's advice: Remember the Internet is event-driven in nature, and spikes will not be limited to predictable peak-user hours. Any special event or promotion could significantly increase hits, and added multimedia elements or security could drag down the system.
QUESTION 2
we can elimnate risk in e commerce process by taking steps given as follows


1------- CRYPTOGRAPHY
2-------VIRTUAL PIN PAYMENT SYSTEM
3-------E CASH PAYMENT SYSTEM


you just have to elaberte these given heading above.

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 1:52 pm

CASE STUDY
E-COMMERCE:
Case study version 1.1
Field Description
Suitable for
Lecture No. 26-38
Topic E-commerce method’s Analysis
Difficulty Level High
Marks 45
Estimated Time 22 Days



To complete this case study .you has to visit [url="http://www.shophive.com"]www.shophive.com[/url]

Note: your answer should be in very precise form. Not more then 6-10 lines

Answers the following Question:

A. Name the different payment systems the shophive.com is using? Marks(5)
B. Name the Certification Authority (CA) in these different payment systems? Marks(5 )
C. Assume that you have your own Bank account in your local branch of online bank.You are going to buying some Laptop from this site.
Draw the steps to be followed in this regard for each payment methods. Except the Cash On Delivery, Check / Money Order / Demand Draft. Marks(10)

D. Propose an E-Cash Payment system for shophive.com. Require Full Drawing-demonstration? Marks(5)
TIPs:
Assuming the following:
a. E-cash bank is and having 5 dollar signature to sign serial no.
b. Client wants to mint a coin of $5 .
c. Any serial # (size of 60 or hundred bytes for a coin), blinding factor r.

E. Which E-business model(s) it is representing and Why? Marks(5) 5
F. Illustrate Shophive .com‘s Market segmentation strategy and E-mail Marketing specially promotion massage?
Marks(5)

G. After visiting the Site, as an expert identify the customer loyalty stage at which stage shophive .com stands?
Marks(5)

H. Identify threats to shophive.com’s competitive position Give Recommendation how to enhance its position future with the help of IT/ECommerce Technologies.? Marks(5)

INSTRUCTIONS

1. You are allowed to consult the online material in preparation of this assignment.
2. Do not copy and paste. Copy (from any Student or copy from any other source ) and pasted material from any source will be awarded zero marks.
3. Please use a 12-point font in Times New Roman or Arial.
4. The Assignment includes Lecture # 26 to Lecture # 38.
5. Last date for the Submission of the assignment is July 24th , 2008.
6. Upload your assignment within due date and time No assignment will be accepted after the due date and time.
7. Case study will not be accepted via Email.
Objectives
• Familiarizing the students Payments methods and E-business Models
• Familiarizing the students Customer Relationship Management (CRM)
• Encourage and stimulate students to Identify Barriers to International business and also completive position..

NOTE:
Your finding should not be exceeding from more than 6 to 10 lines. Avoid writing irrelevant and unnecessary material.

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 2:10 pm

Why do we need protocols in computer networks? Discuss in your own words?

Protocols are like languages. If everyone is not speaking the same language then they won't understand each other. Protocols establish a method of communications without which different platforms couldn't talk.

The protocols in human communication are separate rules about appearance, speaking, listening and understanding. All these rules, also called protocols of conversation, represent different layers of communication. They work together to help people successfully communicate.

The need for protocols also applies to network devices. Computers have no way of learning protocols, so network engineers have written rules for communication that must be strictly followed for successful host-to-host communication. These rules apply to different layers of sophistication such as which physical connections to use, how hosts listen, how to interrupt, how to say good-bye, and in short how to communicate, what language to use and many others.
Question No. 2:
In internet IP Version 4 is going to be replaced by IP Version 6, discuss the major factor behind this change.?
Ipv4 is the fourth version of Internet protocol, but the first one to be widely deployed. It uses a 32 bit addressing and allows for 4,294,967,296 unique addresses. Ipv4 has four different class types, the class types are A, B, C, and D. An example of Ipv4 is 207. 142. 131. 235. The ipv4 uses a subnet mask because of the large numbers of computers used today.
Ipv6 is the next in the advancement of IP’s. Although it is version 6 it will probably be the next widely deployed Internet protocol. Compared to the Ipv4 which allows for only 4,294,967,296 unique addresses, the Ipv6 that uses a 128-bit system will hold 340-undecillion (34, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000, 000) this number is so vast that there are more unique ip addresses than stars in the universe, as we know it.

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 2:35 pm

IT430 Assignments #4

As you know very well that many of the issues/problems in Traditional Business have been resolved by an E-Business. But, an e-business has limitations.

QUESTION: What do you say the biggest issues (any two) in the growth of e-commerce?
You are required to search mechanism how these issues be addressed?
(Note: Give a precise and to the point information)

Marks 10

Report this post Reply with quote
take help from these websites.

http://www.acm.org/ubiquity/views/v4i49_nasir.html .

http://www.ecommercetimes.com/story/13722.html?wlc=1243180198

http://www.apluskb.com/scripts/What_are_the_Benefits_and_answer709.html

http://www.witiger.com/ecommerce/benefits-limitations.htm

Report this post Reply with quote
visit this site
: http://www.selfseo.com/story-16369.php
see handouts page no. 93 to 95 and 127.

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 2:42 pm

IT430- E-Commerce GDB



CYBER CRIME:

Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime”. “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”

WAYS OF CYBER CRIME:

Virus / worm attacks:

Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. E.g. love bug virus, which affected at least 5 % of the computers of the globe. The losses were accounted to be $ 10 million. The world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. Almost brought development of Internet to a complete halt.

Logic bombs:

These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).

Trojan attacks:

This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorized programme. The most common form of installing a Trojan is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the web cam installed in the computer obtained her nude photographs. He further harassed this lady.

Internet time thefts:

Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any other person. This was perhaps one of the first reported cases related to cyber crime in India. However this case made the police infamous as to their lack of understanding of the nature of cyber crime.

Measurements:

Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter-productive

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Admin Sat Aug 22, 2009 2:44 pm

IT430 assignment no. 3

As you have studied some popular public key algorithms:

1) DSS – Digital Signature Standard based on DSA (Digital Standard Algorithm) –
2) RSA
3) Elliptic Curves

Question: [10 Marks]

You are required to provide answers for the given below questions:

1) Differences among the above listed Public Key Algorithms.
Note: One of the differences must contain information that describes the “practical usage” of the particular Algorithm currently.
2) Advantages and disadvantages for the most common and efficient public key
Algorithm applied now a days.

DSA/DSS

The Digital Signature Standard (DSS) was developed by the U.S. National Security Agency and adopted as a Federal Information Processing Standard (FIPS) by the National Institute for Standards and Technology. DSS is based on the Digital Signature Algorithm (DSA). Although DSA allows keys of any length, only keys between 512 and 1,024 bits are permitted under the DSS FIPS. As specified, DSS can be used only for digital signatures, although it is possible to use some DSA implementations for encryption as well.

RSA

RSA is a well-known public key cryptography system developed in 1977 by three professors at MIT: Ronald Rivest, Adi Shamir, and Leonard Adleman. RSA can be used both for encrypting information and as the basis of a digital signature system. Digital signatures can be used to prove the authorship and authenticity of digital information. The key can be any length, depending on the particular implementation used.

Elliptic curves

Public key systems have traditionally been based on factoring (RSA), discrete logarithms (Diffie-Helman), and the knapsack problem. Elliptic curve cryptosystems are public key encryption systems that are based on an elliptic curve rather than on a traditional logarithmic function; that is, they are based on solutions to the equation y2 = x3 + ax + b. The advantage to using elliptic curve systems stems from the fact that there are no known subexponential algorithms for computing discrete logarithms of elliptic curves. Thus, short keys in elliptic curve cryptosystems can offer a high degree of privacy and security, while remaining easily calculatable. Elliptic curves can be computed very efficiently in hardware. Certicom (http://www.certicom.com) has attempted to commercialize implementations of elliptic curve cryptosystems for use in mobile computing.

Advantages for Public Key Encryption


Two of the most common uses for public key cryptography are encrypted messaging and digital signatures:

With encrypted messaging, a person who wishes to send an encrypted message to a particular recipient encrypts that message with the individual's public key. The message can then be decrypted only by the authorized recipient.

With digital signatures, the sender of the message uses the public key algorithm and a private key to digitally sign a message. Anyone who receives the message can then validate the authenticity of the message by verifying the signature with the sender's public key.

http://docstore.mik.ua/orelly/other/puis3rd/0596003234_puis3-chp-7-sect-3.html

Admin
Administrator

Number of posts : 8137
Age : 50
Location : Sharqi Abadi Mustafabad Kasur
Job/hobbies : Do more for other
Mode (i.e. cool, angry etc) : Serious
Warining :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Rate by Admin :
Old IT430 E-Commerce  Assignments Left_bar_bleue0 / 1000 / 100Old IT430 E-Commerce  Assignments Right_bar_bleue

Reputation : 22
Registration date : 2007-10-23

https://meo786.forumotion.com

Back to top Go down

Old IT430 E-Commerce  Assignments Empty Re: Old IT430 E-Commerce Assignments

Post by Sponsored content


Sponsored content


Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum