Index_S


S

SafeNet, 427

Sales

accessorization, 183

B2B selling channels, 355

cross-selling, 247

direct sales, 4

integrated sales-processing capabilities, 4

question-and-answer interfaces for customer service, 183

up- and cross-selling, 183

Sales taxes, 139

Sapient, e-commerce software vendor, 88

Satisfaction, customer satisfaction, 20–21, 164–165

Scalability

architecture planning and, 116

collections to increase, 263

of databases, 191

definition of, 388

of electronic information systems, 366

e-service and, 393–394

geometric scalability, 388–389

linear scalability, 388–389

shopping cart architecture and, 135

SCM. See supply chain management (SCM)

Search engines

AltaVista, 430

Lycos, 430

Overture, 430

registering with, 112

Yahoo, 430

Searching

catalogs and product location, 356

customer needs and behaviors, 395–396

product locators and, 182–183

registering with search engines, 112

search engines, 430

Secure information distribution, 5

Secure Sockets Layer. See SSL (Secure Sockets Layer)

Security

administration of, 260, 263

application development and, 200

authentication, 105

band width on demand and, 247

Bluetooth security features, 153

browser warnings for unsecured sites, 270–272

client-side testing and, 215–216

code-signing IDs, 108–109

Computer Security Institute survey (2002), 209–210

confidentiality, 105

cyber crime, 209–210, 298–299

data alteration, 105

data integrity, 106

delegation of credentials and, 260

denial of service (DoS) attacks, 210

digital currencies and, 328

digital wallets for credit cards, 349

distributed systems and, 250–253

DMZs, 127–128

eavesdropping, 105

education in Internet security, 213

Enterprise Application Security Integration (EASI), 244–248

firewalls, 43–44, 127–128

fundamental security concerns, 12

Global Server IDs, 280, 281

HTTP and HTTPS, 125, 127

information security, 43–44, 249–250

infrastructure for trusted e-commerce, 224–233

inside attacks, 211

instant messaging as risk, 218–219

integrity of transactions, 246

Internet users concerns regarding, 42–43

at lower layers of architecture, 262

mobile technologies and, 152–153

needs for, 212–213

9-11 events and effects on, 43–45

outside attacks, 210–211

outsourcing solutions, 222

preventive measures, checklists, 211–212

privacy and security statement, 109

privacy concerns, 31–32, 109

proof of communication, 106

proxy services and, 260

as risk management, 248–249

risks of e-commerce, 104–105, 245–246

secure servers and SSL, 233–239

security policies, 44

security tools, 44

server security, 233–239, 267–276, 280

shopping carts and, 140

spoofing, 105

SSL (Secure Sockets Layer), 104, 125, 127

supply chain management, 247

technology policies and, 38

threats to, 213–215

trusted computing base (TCB) and security, 251–252

unauthorized intrusions, 210

viruses, worms, and Trojan horses, 210–211

Web site implementation and, 125

of Web sites, 98, 127

see also encryption; Enterprise Application Security Integration (EASI); hackers and hacking; SSL certificates

Security association, 264

EASI and, 260

Security proxy services, EASI and, 260

Servers

backup servers, 239

costs of, 389

dedicated server vs. shared hosting for web sites, 103

multiple server security, 237–239, 267–276, 280

security, 233–239

SSL server authentication, 106

SSL Server certificates, 233–239

Web site servers described, 115, 117

Service denials (DoS) attacks, 210

Servlets, 131–133

CustomerServlets, 133–135, 137–138

HTML generation by, 131

Java servlets and databases, 192

JSP pages and, 138

Session Initiation Protocol (SIP)

benefits of, 14

described, 13–14

multimedia options and, 14–15

scope of Internet and Web, 13–15

SGC (Server Gated Cryptography), 237

Share dealing, case study, 453–454

Shipping charges, 139

Shopping carts

architecture for, 135–136

basic scenario and workflow, 132–135

BasketBeans, 134

cookies and, 139

CustomerServlets, 133–135

database connectivity, 139

data transactions and, 135

discounts, 140

documentation and support, 139

evaluating setups for, 138–139

order processing features, 139

product data, 134

report generation by shopping cart systems, 140–141

SAP Open Catalog Interface and, 67

security and, 140

shipping charges, 139

tax collections (sales taxes), 139

updates of product data and, 140

Signer certificates, 229–233

SIMPLE (SIP for Instant Messaging Leveraging Extensions), 218–219

SIP, 14–15, 33

Site design, 97, 100–103, 118, 121–124

consistency and customer comfort, 17–18

customer-oriented design, 102–103

failures and loss of business, 21

interactivity of site, 397

links on sites, 397–398

visual content of site, 397

Site development. See Web sites

Smart cards

banks migrating to smart-card-based systems, 306–312

certificate authorization (CA) for, 311

as digital currency, 326–327

EMV specifications for, 305

European specifications for, 306

issuing process for, 307

vs. magnetic stripe cards, 306–312

MasterCard specifications for, 305

personalization of, 307–312

point-of-sale solutions and, 306

service providers, 345

sources of, 349

standardization of, 304–306

Visa specifications for, 305

Socrates, 303

Software

application development software, 202

best practices and, 398–399

report generating capabilities, 140–141, 399

vendors, 86–89

for wireless technologies, 151

see also application development

Software piracy, 39

Specifications and standards, 433

Speed

of access as vital to success, 17

business strategies and, 76

of digital currency transactions, 327–328

integration and time to market, 389

as performance measure for databases, 191

rapid application development, requirements for, 198–200

Transaction Market management (TMM) technologies and increased, 27

Spoofing, 105

SPYRYS Inc., 428

SSL certificates

acquiring, 107–108

authentication and, 105–106, 269, 287–289

browser warnings, 270–272

Certification Authority (CA) for, 278, 280

client authentication, 280

costs of, 267, 282

described, 269–272

enabling SSL, 125

encryption and, 106–108

enrollment for, 275, 283

evaluating network needs, 273–274

free trial for, 282

function of described, 279

high- and low-assurance certificates, 286

instructions for use, step-by-step, 281–284

message integrity, 270

message privacy, 269

multiple server security and, 237–239, 267–276, 280

obtaining, 283–284

one-by-one vs. PKI purchases, 273–274

process, step-by-step description, 235

process described, 107

public key infrastructure (PKI) and, 273–276

server software installation, 282

use statistics, 268, 278

SSL encryption, 104

SSL (Secure Sockets Layer), 125, 127, 233

encryption and, 233–235

multiple server security, 237–239, 267–276, 280

server authentication, 233

shopping carts as SSL capable, 140

strengths (40-bit and 128-bit), 234, 236

see also SSL certificates

SSL server certificates, 233–239

SGC (Server Gated Cryptography) and, 237

sharing of, 238

Status reports, for customer orders, 126

Storage, Web site storage space, 104

Stored-value cards. See smart cards

StyleClick, Inc., 428, 432

Sun MicroSystems, 428

Supply chain management (SCM), 6–9

banking online, 5

billing online, 5

core operations and, 80–82

demand management, 79

enrollment workflows, 224

inbound / outbound logistics, 79

Internet service providers, 428–429

secure information distribution, 5

security and, 247

supply management, 79

Symbol, wireless hardware vendor, 150




Electronic Commerce (Networking Serie 2003)
Electronic Commerce (Charles River Media Networking/Security)
ISBN: 1584500646
EAN: 2147483647
Year: 2004
Pages: 260
Authors: Pete Loshin

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net