Part - II
Hasan Shirazi
M. Sc (Physics) [Jahangirnagar University], MBA (HRM & Finance), MA (HRM) [School of Management , University of Bradford, UK] Copyright 2013 Hasan Shirazi, PHI Consulting 1
1-3
1-4
1-5
1-6
1-7
1-8
1-9
1-10
1-11
1-12
1-13
The EC Framework,
e-tailing
Online retailing, usually B2C
business-to-business-to-consumer (B2B2C)
E-commerce model in which a business provides some product or service to a client business that maintains its own customers
1-15
1-16
intrabusiness EC
E-commerce category that includes all internal organizational activities that involve the exchange of goods, services, or information among various units and individuals in an organization
1-17
consumer-to-consumer (C2C)
E-commerce model in which consumers sell directly to other consumers
1-18
exchange-to-exchange (E2E)
E-commerce model in which electronic exchanges formally connect to one another for the purpose of exchanging information
1-20
1-21
23
24
25
26
Routers
o Specialized devices that connect networks, locate the best path of transmission, and ensure that data reaches its destination
27
28
Internet Protocol
o Handles the address part of each packet so that it gets to the right destination
29
30
Going Online
Internet service providers (ISPs)
o Supply and sustain user connections to the Internet o Maintain the hardware and software o Protect their sites and networks from outside threats
31
Going Online
Wireless Internet service provider
o Company that provides wireless Internet access o Examples: AT&T, T-Mobile, and Verizon Wireless
Hot spot
o Public location that provides Internet access for wireless devices o Examples: airport, college campus, or coffee shop
32
33
34
35
Web browser
o Program that displays Web pages and linked items
Web site
o Collection of Web pages Typically contains a home page (also called an index page)default page displayed when you enter a site
36
Hyperlinks or links
o Words and images that bring other documents into view when clicked
37
Web 2.0
Network-based content development system Uses multimedia resources as a means to of navigation or illustration Current generation of the Web Provides opportunities to collaborate, interface, and create new content using blogs, Wikis, and podcasts Dead links (also known as broken links) Information posted on the Web is not validated. Information overload due to too much data
38
39
Browser cache
o
40
41
42
History list
o Compiles a list of the Web pages visited
43
Uploading
o Process of transferring a file or document from users computer to another computer
44
Link rot
45
46
Phrase searching
o Replace the zero or additional characters in search words to improve search accuracy o Examples: ? and *
Inclusion operators
o Place quotation marks around a phrase to create a complete unit for search purposes o The resultsearch engines retrieve only those sites that contain the exact phrase o Used so only Web pages including those criteria are retrieved o Example: plus sign (+) o Used so only Web pages excluding those criteria are retrieved o Example: minus sign (-)
47
Exclusion operators
Nesting
o A Boolean search operator that uses parentheses o The search engine evaluates the expression from left to right, and searches for content in the parentheses first
48
49
50
E-mail attachment
o Computer file included with an e-mail message
E-mail address
o Unique cyberspace address for each individual o Consists of a user name, the name of the hosting e-mail service, and the top-level domain
Spam
o Unsolicited e-mails, usually from advertisers o Do not open spam
51
Spyware
o Gathers data from a system without knowledge
Botnet
o Set of infected computers that places computers under the control of a bot herder
52
Social networking
Special type of Internet service that gives users the ability to join chat groups called channels Helps people connect Sites such as MySpace provide the ability to create large communities online.
53
54
Anonymous FTP
o Files are available publicly available for downloading o Lack of security o Do not send sensitive material
55
Safe Surfing
Guidelines for safe surfing
o o o o o o o Never give out identifying information. Never respond to suggestive messages. Never open e-mail from an unknown source. Never allow a child to make arrangements for a face-to-face meeting alone. Remember individuals online may not be who they claim to be. Set reasonable rules and guidelines for computer use by children. Make using the computer a family activity.
56
Safe Surfing
Protecting your identity
o Avoid shoulder-surfers, people who stand close enough to see PIN numbers o Look for secure Web site features before entering information. https:// in the address instead of http:// Site seal provided by a security vendor such as VeriSign Locked padlock symbol on the Web sitebe sure it is not a fake image Logo from other site-security entities, such as Verified by Visa Message box that identifies you are entering or leaving a secure site
57