Task 1 (a)
There are many things to consider when implementing an e-commerce system for the reliable transfer of money and goods online, as each part of the chain has to be analysed to make sure that it is not the weak link that will be the downfall of the entire system.
In this document, I will be outlining some of the more common forms of e-commerce hardware, software and networking technologies that are commonly employed in the world of e-commerce.
When choosing software to implement, one must think if it fulfils a number of criteria, some of these criteria would be things such as:
• Easy for the buyer to use, such as a “shopping basket” style interface
• Secure, for both the buyer’s details and the seller’s systems and information
• The design fits with the rest of the site that has been implemented into, as to appear seamlessly integrated with the rest of the site
• Making the customer feel safe, and that their details will not be stolen
In many cases it may be a better idea to use a third party, or “cybermediary” e-commerce based website, as they often have reputations for being fair and reliable, or, if nothing else, recognisable. One example of a third party e-commerce site would be that of PayPal; PayPal is quite possibly the biggest site at the time of writing based solely to the transaction of money for goods, and has features such as a “Resolution centre”, where the customer can give any complaints and have them seen to by the seller.
The main benefit of outsourcing in this manner would be that of the reputation that PayPal would lend to the business, as many people would not be comfortable giving their personal information and credit card details to a site that they have never heard of bef...
... middle of paper ...
...the alternatives against cyber-theft, as long as a reputable company is used.
The user does not generally have to remember a password to use their credit card, as the physical card, or the numbers, are generally all that is required. Can be very easy to use, and does not necessarily require the use of a credit card.
Cons Generally perceived as more unsafe from cyber-theft, as well as conventional theft of the physical card being a possible danger. Easier for people that the end-user knows in person to gain access by social engineering, and as such gain access to the victim’s funds.
In some countries credit cards are still not considered safe to use, and alternative methods of payment are recommended. Complaints departments of some organisations such as paypal, are notoriously hard to contact, with things such as contact numbers being completely unavailable.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Sometime last year, a software package came available that allows employers to monitor their workers’ Internet usage. It contains a database of about 45,000 web sites that are categorized as productive, neutral, and rates operators based on their browsing. It identifies the most frequent users and the most popular sites, and it’s called Little Brother. There are also programs to search emails and programs to block objectionable websites, beyond installing monitoring software. Your employer can simply go into your hard drive, check your cache to see where you’ve been on the net, and I read your e-mail.... [tags: employees, computer, email]
667 words (1.9 pages)
- Introduction Is technology making us smarter or dumber. With the increase in the use of smartphones and autocorrect technology for the past ten years, the eras of the dictionary are over. These days, corrections are made with a mindless click of a button, which does not allow the users think themselves. Individuals have a tendency to use spell check more often than actually knowing how to spell a word, or how to use grammar correctly. Technologies like word prediction can compare a typed word with a word in the dictionary list and recognize a mismatch as a misspelled word.... [tags: smartphones, autocorrect technologies]
1038 words (3 pages)
- I. INTRODUCTION Modern networking technologies are dramatically making major contributions to our Information Technology industry. Remote systems are acknowledged as a standout amongst the most climbing innovations in today's reality. The cheapest known stand-alone device used for communication is Intercom. Nearly all of your workplaces in addition to houses contain these kinds of convenient products. These plans are mounted for safety purposes so authenticated person easily identified. Nevertheless, very much development is necessary inside these types of technologies along with devices.... [tags: modern networking technologies]
2646 words (7.6 pages)
- Distributed Software Development As new technologies emerge, they often eliminate certain types of jobs. History is littered with many such examples. The number of bank tellers dropped by about 37% between 1983 and 1993.1 The new technology responsible for eliminating those jobs was the ATM (Automatic Teller Machine). More recently, the wide popularity of buying books over the web has caused many book stores to close down. You may have noticed this in your own neighborhood. Since the Industrial Revolution, technology has been blamed for massive unemployment.2 However, more recently, in addition to technology eliminating certain jobs, technology is enabling the transferring (for valid re... [tags: Outsourcing Careers Technology Essays]
2988 words (8.5 pages)
- The design and implementation of the PHOTON prototype system has been presented in Chapter 7. The implementation in the different software settings such as implementing the ontology in a storage environment, implementing the ontology in an ontology environment and implementing the ontology in a reasoning environment were also presented. In order to evaluate the PHOTON prototype system in its different environment it is important to revisit some key research questions of this study; “How can knowledge about photovoltaic systems be made easily accessible to end-users?” In order to efficiently manipulate photovoltaic system knowledge; it is important that the PHOTON ontology is well structured... [tags: Information Technology]
1642 words (4.7 pages)
Java Web Services Technologies: Java API for XML Web Services (JAX-WS) and Java API for RESTful Web Services (JAX-RS)
- ... The Metro stack consisting of JAX-WS, JAXB, and WSIT, enable you to create and deploy secure, reliable, transactional, interoperable Web services and clients. The Metro stack is part of Project Metro and as part of GlassFish, Java Platform, Enterprise Edition (Java EE), and partially in Java platform, Standard Edition (Java SE). GlassFish and Java EE also support the legacy JAX-RPC APIs." In today's technologically driven society, Web Services are quickly becoming the most pertinent technologies in computer software, e-business and communication industries.... [tags: applications components]
1285 words (3.7 pages)
- The World Wide Web “The Web does not just connect machines, it connects people” (Tim Berners-Lee). Tim Berners-Lee wanted to create a way for physicists to communicate information easily between one another. He ended up creating one of the most highly used pieces of software on the internet today and an incredibly versatile way of sharing information globally. The Web had become such a big part of our everyday lives that a lot of us would not know what to do without it. Some people do not fully understand what the Word Wide Web actually is though.... [tags: Tim Berners, internet, network, URL]
1009 words (2.9 pages)
- Electronic commerce, most commonly referred to as e-commerce, is a term used to describe business transactions which involve the transfer of information and goods using the power of the computer networks such as the internet and the World Wide Web. E-commerce is classified into five different categories depending on the relationship among the participants; the most common examples are business-to-business (B2B), business-to-consumer (B2C), or business-to-government (B2G). (Schneider, 2015) E-commerce has evolved drastically over the past years and this has dramatically changed the way businesses are run today.... [tags: Electronic commerce, Online shopping, Business]
866 words (2.5 pages)
- The Major Catalysts in the Formation of the Internet and Digital World Introduction There exisits two schools of thought concerning which components have been the major catalysts in the forming of the internet and digital world as we know it today. Both entertain stimulating and valid arguments. Manovich stipulates that the visual format of the internet is purely based on the visual reasoning that erupted out of the late nineteenth century as a result of constructivist principles and the tremendous introduction of the cinema, while Cook provides a good argument that although the assertions made by Manovich are true, Manovich overlooks an important component to the aesthetics and organiza... [tags: Internet Digital Essays]
2671 words (7.6 pages)
- SOFTWARE A set of instructions that directs a computer's hardware to perform a task is called a program, or software program. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. The two main types of software are system software and application software. System software controls a computer's internal functioning, chiefly through an operating system , and also controls such peripherals as monitors, printers, and storage devices.... [tags: Computer Technology Software]
1664 words (4.8 pages)