SafeNet, 427
Sales
accessorization, 183
B2B selling channels, 355
cross-selling, 247
direct sales, 4
integrated sales-processing capabilities, 4
question-and-answer interfaces for customer service, 183
up- and cross-selling, 183
Sales taxes, 139
Sapient, e-commerce software vendor, 88
Satisfaction, customer satisfaction, 20–21, 164–165
Scalability
architecture planning and, 116
collections to increase, 263
of databases, 191
definition of, 388
of electronic information systems, 366
e-service and, 393–394
geometric scalability, 388–389
linear scalability, 388–389
shopping cart architecture and, 135
SCM. See supply chain management (SCM)
Search engines
AltaVista, 430
Lycos, 430
Overture, 430
registering with, 112
Yahoo, 430
Searching
catalogs and product location, 356
customer needs and behaviors, 395–396
product locators and, 182–183
registering with search engines, 112
search engines, 430
Secure information distribution, 5
Secure Sockets Layer. See SSL (Secure Sockets Layer)
Security
administration of, 260, 263
application development and, 200
authentication, 105
band width on demand and, 247
Bluetooth security features, 153
browser warnings for unsecured sites, 270–272
client-side testing and, 215–216
code-signing IDs, 108–109
Computer Security Institute survey (2002), 209–210
confidentiality, 105
cyber crime, 209–210, 298–299
data alteration, 105
data integrity, 106
delegation of credentials and, 260
denial of service (DoS) attacks, 210
digital currencies and, 328
digital wallets for credit cards, 349
distributed systems and, 250–253
DMZs, 127–128
eavesdropping, 105
education in Internet security, 213
Enterprise Application Security Integration (EASI), 244–248
firewalls, 43–44, 127–128
fundamental security concerns, 12
Global Server IDs, 280, 281
HTTP and HTTPS, 125, 127
information security, 43–44, 249–250
infrastructure for trusted e-commerce, 224–233
inside attacks, 211
instant messaging as risk, 218–219
integrity of transactions, 246
Internet users concerns regarding, 42–43
at lower layers of architecture, 262
mobile technologies and, 152–153
needs for, 212–213
9-11 events and effects on, 43–45
outside attacks, 210–211
outsourcing solutions, 222
preventive measures, checklists, 211–212
privacy and security statement, 109
privacy concerns, 31–32, 109
proof of communication, 106
proxy services and, 260
as risk management, 248–249
risks of e-commerce, 104–105, 245–246
secure servers and SSL, 233–239
security policies, 44
security tools, 44
server security, 233–239, 267–276, 280
shopping carts and, 140
spoofing, 105
SSL (Secure Sockets Layer), 104, 125, 127
supply chain management, 247
technology policies and, 38
threats to, 213–215
trusted computing base (TCB) and security, 251–252
unauthorized intrusions, 210
viruses, worms, and Trojan horses, 210–211
Web site implementation and, 125
of Web sites, 98, 127
see also encryption; Enterprise Application Security Integration (EASI); hackers and hacking; SSL certificates
Security association, 264
EASI and, 260
Security proxy services, EASI and, 260
Servers
backup servers, 239
costs of, 389
dedicated server vs. shared hosting for web sites, 103
multiple server security, 237–239, 267–276, 280
security, 233–239
SSL server authentication, 106
SSL Server certificates, 233–239
Web site servers described, 115, 117
Service denials (DoS) attacks, 210
Servlets, 131–133
CustomerServlets, 133–135, 137–138
HTML generation by, 131
Java servlets and databases, 192
JSP pages and, 138
Session Initiation Protocol (SIP)
benefits of, 14
described, 13–14
multimedia options and, 14–15
scope of Internet and Web, 13–15
SGC (Server Gated Cryptography), 237
Share dealing, case study, 453–454
Shipping charges, 139
Shopping carts
architecture for, 135–136
basic scenario and workflow, 132–135
BasketBeans, 134
cookies and, 139
CustomerServlets, 133–135
database connectivity, 139
data transactions and, 135
discounts, 140
documentation and support, 139
evaluating setups for, 138–139
order processing features, 139
product data, 134
report generation by shopping cart systems, 140–141
SAP Open Catalog Interface and, 67
security and, 140
shipping charges, 139
tax collections (sales taxes), 139
updates of product data and, 140
Signer certificates, 229–233
SIMPLE (SIP for Instant Messaging Leveraging Extensions), 218–219
SIP, 14–15, 33
Site design, 97, 100–103, 118, 121–124
consistency and customer comfort, 17–18
customer-oriented design, 102–103
failures and loss of business, 21
interactivity of site, 397
links on sites, 397–398
visual content of site, 397
Site development. See Web sites
Smart cards
banks migrating to smart-card-based systems, 306–312
certificate authorization (CA) for, 311
as digital currency, 326–327
EMV specifications for, 305
European specifications for, 306
issuing process for, 307
vs. magnetic stripe cards, 306–312
MasterCard specifications for, 305
personalization of, 307–312
point-of-sale solutions and, 306
service providers, 345
sources of, 349
standardization of, 304–306
Visa specifications for, 305
Socrates, 303
Software
application development software, 202
best practices and, 398–399
report generating capabilities, 140–141, 399
vendors, 86–89
for wireless technologies, 151
see also application development
Software piracy, 39
Specifications and standards, 433
Speed
of access as vital to success, 17
business strategies and, 76
of digital currency transactions, 327–328
integration and time to market, 389
as performance measure for databases, 191
rapid application development, requirements for, 198–200
Transaction Market management (TMM) technologies and increased, 27
Spoofing, 105
SPYRYS Inc., 428
SSL certificates
acquiring, 107–108
authentication and, 105–106, 269, 287–289
browser warnings, 270–272
Certification Authority (CA) for, 278, 280
client authentication, 280
costs of, 267, 282
described, 269–272
enabling SSL, 125
encryption and, 106–108
enrollment for, 275, 283
evaluating network needs, 273–274
free trial for, 282
function of described, 279
high- and low-assurance certificates, 286
instructions for use, step-by-step, 281–284
message integrity, 270
message privacy, 269
multiple server security and, 237–239, 267–276, 280
obtaining, 283–284
one-by-one vs. PKI purchases, 273–274
process, step-by-step description, 235
process described, 107
public key infrastructure (PKI) and, 273–276
server software installation, 282
use statistics, 268, 278
SSL encryption, 104
SSL (Secure Sockets Layer), 125, 127, 233
encryption and, 233–235
multiple server security, 237–239, 267–276, 280
server authentication, 233
shopping carts as SSL capable, 140
strengths (40-bit and 128-bit), 234, 236
see also SSL certificates
SSL server certificates, 233–239
SGC (Server Gated Cryptography) and, 237
sharing of, 238
Status reports, for customer orders, 126
Storage, Web site storage space, 104
Stored-value cards. See smart cards
StyleClick, Inc., 428, 432
Sun MicroSystems, 428
Supply chain management (SCM), 6–9
banking online, 5
billing online, 5
core operations and, 80–82
demand management, 79
enrollment workflows, 224
inbound / outbound logistics, 79
Internet service providers, 428–429
secure information distribution, 5
security and, 247
supply management, 79
Symbol, wireless hardware vendor, 150