computers © 2005 prentice-hall, inc.slide 1. computers chapter 8 e-commerce ( 電子商務 ),...

49
Computers © 2005 Prentice- Hall, Inc. Slide 1

Post on 18-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Computers

© 2005 Prentice-Hall, Inc. Slide 1

Computers

Chapter 8

E-Commerce (電子商務 ), Databases, and Security(安

全 )

© 2005 Prentice-Hall, Inc. Slide 2

ComputersChapter 8 – E-Commerce, Databases, and

Security

ObjectivesUnderstand the scope (範圍 ) and concepts ofe-commerce.Describe database concepts, features (特色 ),and applications.Identify points of security vulnerability (弱點 ) and how to address (處理 ) computer security concerns (關心 ).

© 2005 Prentice-Hall, Inc. Slide 3

ComputersE-Commerce, Databases, and Security

E-CommerceE-commerce – doing business (生意 ) online or via some form of data communications

© 2005 Prentice-Hall, Inc. Slide 4

ComputersE-Commerce, Databases, and Security

The Scope of E-Commerce E-tailing (online retailing, 線上零售 )

© 2005 Prentice-Hall, Inc. Slide 5

ComputersE-Commerce, Databases, and Security

The Scope of E-Commerce Business-to-business (B2B) Business-to-consumer (B2C) Consumer-to-consumer (C2C)

© 2005 Prentice-Hall, Inc. Slide 6

ComputersE-Commerce, Databases, and Security

The Scope of E-Commerce Internet marketing (行銷 ) and advertising (廣告 ) Online surveys (調查 ) Technologies such as fax, e-mail, intranets, etc.

© 2005 Prentice-Hall, Inc. Slide 7

ComputersE-Commerce, Databases, and Security

E-Commerce Levels (平等化 ) the playing field; allows small companies to compete (競爭 ) with large ones

© 2005 Prentice-Hall, Inc. Slide 8

ComputersE-Commerce, Databases, and Security

E-Commerce E-commerce and e-money

Electronic money (電子錢 )

© 2005 Prentice-Hall, Inc. Slide 9

ComputersE-Commerce, Databases, and Security

E-Commerce Business-to-business (B2B) –businesses working with other businesses via technology

© 2005 Prentice-Hall, Inc. Slide 10

ComputersE-Commerce, Databases, and Security

E-Commerce Business-to-consumer (B2C) –businesses interacting with customers via the Internet

Disintermediation (去居中者化 ) – fewer middle men

© 2005 Prentice-Hall, Inc. Slide 11

ComputersE-Commerce, Databases, and Security

E-Commerce E-Tailing – retail via the Internet

Bricks (磚頭 ) and mortar (石灰 ) – storefront (店前 ) businessClick and brick – company that provides a physical (實體 ) storefront and Internet shoppingShop bot– computer program that shops (逛街 ) for lowest online prices

© 2005 Prentice-Hall, Inc. Slide 12

ComputersE-Commerce, Databases, and Security

E-Commerce E-trading – trading stocks (股票交易 ) online E-ticketing – airlines’ paperless (無紙 ) ticketing (訂票 )

© 2005 Prentice-Hall, Inc. Slide 13

ComputersE-Commerce, Databases, and Security

E-Commerce Consumer-to-consumer (C2C) –interaction (互動 ) between users

Online auctions (拍賣 )Online dating (交友 ) services

© 2005 Prentice-Hall, Inc. Slide 14

ComputersE-Commerce, Databases, and Security

E-Commerce Electronic publishing (e-publishing, 電子出版 ) – alternative to hard copy (紙上 ) ; documents (文件 ) are stored on hard disks (硬碟 )

Electronic documents or online documents

© 2005 Prentice-Hall, Inc. Slide 15

ComputersE-Commerce, Databases, and Security

E-Commerce Advantages of electronic publishing

Good for the environment (環境 )Allows for integration of audio/video Permits hyperlink navigation (瀏覽 ) of documentsDocuments are searchable (可搜尋的 )Cheaper than traditional (傳統 ) publishingDocuments can be easily updated (更新 )

© 2005 Prentice-Hall, Inc. Slide 16

ComputersE-Commerce, Databases, and Security

E-Commerce Creating electronic documents

Word processingHTML Portable (可攜 ) documents – Portable Document Format (PDF); files can be highlycompressed (壓縮 )

© 2005 Prentice-Hall, Inc. Slide 17

ComputersE-Commerce, Databases, and Security

E-Commerce Trend (趨勢 ) toward electronic publishing

Electronic magazines (e-zines, 電子雜誌 )

© 2005 Prentice-Hall, Inc. Slide 18

ComputersE-Commerce, Databases, and Security

E-Commerce Web marketing (網路行銷 )

Banner (橫幅 ) ads – horizontal ads (橫置廣告 )Skyscraper (高聳 ) ads – vertical ads (直立廣告 )Pop-under ads (跳出廣告 ) – ads that open in their own (自己 ) windowsFloating ads (浮動逛告 ) – ads that appear (出現 ) over desired (想要 ) Web page

© 2005 Prentice-Hall, Inc. Slide 19

ComputersE-Commerce, Databases, and Security

E-Commerce Web marketing

Click through rate (點選量比率 )– the percentage (百分比 ) of people who click on a hyperlinked (超鏈結 ) advertisement

© 2005 Prentice-Hall, Inc. Slide 20

ComputersE-Commerce, Databases, and Security

E-Commerce Building (建立 ) a Web site for e-commerce

E-commerce hosting (作莊 ) services – allow userswith little experience (經驗 ) to create their own e-commerce site (網站 ) Online shopping cart (購物車 ) – place where onlinecustomers can store items they intend (想要 ) to purchase (購買 )

© 2005 Prentice-Hall, Inc. Slide 21

ComputersE-Commerce, Databases, and Security

Databases: Information Storage (儲存 ) and Retrieval (擷取 )

Managing (處理 ) DataSpreadsheet (速算表 )Database

© 2005 Prentice-Hall, Inc. Slide 22

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Hierarchy (階層 ) of data organization (組織 )

Bits and characters (字元 ) Fields ( 欄 )Records (紀錄 )Files (檔案 )Database

© 2005 Prentice-Hall, Inc. Slide 23

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Data integration (整合 )Flat (平舖式 ) files – no link (索引 ) between files Database Management Systems (DBMS, 資料庫管理系統 ) – integrate data management and information flow

© 2005 Prentice-Hall, Inc. Slide 24

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Benefits (利益 ) of integrated (整合 ) databases

Greater access (接觸 ) to informationBetter control More efficient software development (發展 )

© 2005 Prentice-Hall, Inc. Slide 25

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Types of database management systemsNetwork (網路式 ) DBMSRelational (關聯式 ) DBMSObject-oriented (物件式 ) DBMS

© 2005 Prentice-Hall, Inc. Slide 26

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Network DBMS – establishes (建立 )relationships (關係 ) between records

Set (集合 )Schema (綱要 ) – logical structure of the database

© 2005 Prentice-Hall, Inc. Slide 27

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Relational DBMS – accesses data bycontent (內容 ), not address

Defined (定義 ) in logical, not physical, terms (語詞 )Distributed (分散式 ) DBMS

© 2005 Prentice-Hall, Inc. Slide 28

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Creating a Relational DBMS Data stored in tables ( 表 )

Row ( 列 ) – record Column ( 欄 ) – field of data

© 2005 Prentice-Hall, Inc. Slide 29

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Relational DBMSQuery (查詢 ) by example (例子 )

Relational (關係 ) operators (操作子 ) Logical operators

© 2005 Prentice-Hall, Inc. Slide 30

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Relational DBMSQuery language – user-friendly (親和 ) language for requesting (要求 ) information

Structured (結構式 ) Query Language (SQL)

© 2005 Prentice-Hall, Inc. Slide 31

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Relational DBMSSorting records

Primary (主要 ) sort (排序 ) fieldSecondary (次要 ) sort field

Generating (產生 ) reports (報表 )

© 2005 Prentice-Hall, Inc. Slide 32

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Object-oriented DBMS – capable ofstoring audio, video, animation (動畫)

Object – an item (項目 ) that can be selected (選取 ) and manipulated (處理 )

Object/Relational DBMS

© 2005 Prentice-Hall, Inc. Slide 33

ComputersE-Commerce, Databases, and Security

Databases: Information Storage and Retrieval

Data warehousing (倉儲 ) and data mining (採礦 )

Data warehousing – moving (移動 ) existing (現有 ) files to a data warehouse, a relational database created to help managers (經理 ) get the information they needData mining – searching data for implicit (隱含 ) associations (關聯 ) between data

© 2005 Prentice-Hall, Inc. Slide 34

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security Computer center security vulnerable (脆弱 ) points

HardwareSoftwareFiles/databasesPersonnel (人事 )The InternetE-commerce

© 2005 Prentice-Hall, Inc. Slide 35

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security Computer center security vulnerablepoints

HardwareFault-tolerant (容錯 ) systems – continue (繼續 ) to work even if important (重要 ) components fail (失敗 )Uninterruptible (不中斷 ) Power (電力 ) Supply (UPS) – buffer (緩衝 ) between external (外在 ) power and the computer system

© 2005 Prentice-Hall, Inc. Slide 36

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Computer center security vulnerablepoints

SoftwareUnlawful (非法 ) modification (更改 )Viruses (病毒 )Files/databases – make backup (備分 ) copies!

© 2005 Prentice-Hall, Inc. Slide 37

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Computer center securityBack-up for home/small office PCs

Full backup – all files Selective (選擇性 ) backup – user-selected files Incremental (遞增性 ) backup – only files that have changed since last back-up

© 2005 Prentice-Hall, Inc. Slide 38

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Computer center securityBackup for Internet and network servers

Redundant (重複 ) Array (陣列 ) of Independent (獨立 ) Disks (RAID) – fault-tolerant backup systemTape backup units (TBU)

Data cartridge (資料匣 )

© 2005 Prentice-Hall, Inc. Slide 39

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Computer center security vulnerablepoints

The Internet and e-commerceEncryption (加密 ) – scrambling (弄亂 ) of messages sent via communications pathways (路徑 )Cryptography (密碼學 )– crime (犯罪 ) prevention (預防 ) technology

© 2005 Prentice-Hall, Inc. Slide 40

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security Computer center security vulnerablepoints

The Internet and e-commercePublic-key (公開金匙 ) encryption – requires (需要 ) both a private (私人 ) key known only to the sender and a public (公開 ) keyIdentity-based (身分 ) encryption – converts an e-mail address to a number

© 2005 Prentice-Hall, Inc. Slide 41

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Computer center security vulnerablepoints

The Internet and e-commerceSecure Sockets Layer (SSL, 安全插座層 ) – used to transmit (傳送 ) sensitive (敏感 ) dataDigital certificate (證明 ) or digital ID – attachment (附注 ) to an electronic message that verifies (驗證 ) sender’s identity

© 2005 Prentice-Hall, Inc. Slide 42

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Computer center security vulnerablepoints

The Internet and e-commerceFirewall (防火牆 ) – software that protects (保護 ) against hackers (駭客 )

© 2005 Prentice-Hall, Inc. Slide 43

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security Information systems security

Physical (實質 ) security –protects items that could be illegally (非法 ) accessed or destroyed (破壞 )Logical security – security measures (手段 )built into software

User IDsPasswords

© 2005 Prentice-Hall, Inc. Slide 44

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Information systems securityNever tell anyone your password.Never write down your password.Change your password frequently (常常 ).

© 2005 Prentice-Hall, Inc. Slide 45

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

Information systems securityTailgating (檢便宜 ) – when someone simply continues a session (通訊過程 ) started by a legitimate (合法 ) user who did not sign off (登出 ) the system

© 2005 Prentice-Hall, Inc. Slide 46

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security Information systems security

Biometric (生物技術 ) identification systems – detect (偵測 ) unique (唯一 ) personal characteristics (特徵 )

Fingerprint (指紋 )Palm print (掌紋 )Iris scan (眼紋 )Face recognition (認知 ) technology

© 2005 Prentice-Hall, Inc. Slide 47

ComputersE-Commerce, Databases, and Security

Computer, Internet, and System Security

PC securityLock ( 鎖 ) and key ( 匙 )Badge (名牌 ) readerAssigning (指定 ) passwords to individual (個別 ) files

© 2005 Prentice-Hall, Inc. Slide 48

Computers Chapter 8 – E-Commerce, Databases, and

SecurityLesson Summary

• Understand the scope and concepts of e-commerce.

• Describe database concepts, features, and applications.

• Identify points of security vulnerability and how to address computer security concerns.

© 2005 Prentice-Hall, Inc. Slide 49