(10.1) Ecommerce concepts
Background
had to have a browser(95)
World Wide Web (made in 91) set universal standards
E-commerce mid to late 90s didn’t take off til 2000’s
Features
ubiquity - always there all the time
global reach - it can be accessed at any time any place as long as you have internet connection
Standards - set of universal standards
Richness - information that is complex (videos)
Interactivity - we can have back and forth conversations
Info density - volume of information
Personalization - everyone can have a different experience styled to them specifically
SoCial tech -social media and can promote user content
Digital markets
reduce info asymmetry - buyer and the seller has the same information
Reduce menu, search, & transaction costs - costs like with printing a new menu when prices update, search & transaction costs are lower bc you don’t need a person to do it
Enable price discrimination, dynamic pricing, and disintermediation - can base prices off of income of area, prices can change any second,
Cause delayed gratification - have to wait for product for convience
Digital goods
digital goods - a food itself that is delivered electronically over the internet
Features
Costs lower - all costs with digital units are in the first unit, so everything else is inexpensive, don't have to store it anywhere so don't need staff, no delivery costs, marketing about the same
(10.2)Business and revenue models
types of e-commerce
B2C - a business to consumer
B2B - business to business, they sell goods and services to each other (biggest one)
C2C - consumer to consumer,
Business models - an abstraction of how you create wealth, how are you creating value for the customer in the thing that you do
e-tailer - selling a physical good to a customer online
content provider - selling any kind of information like movies, articles, magazines, etc.
transaction broker -find you options for products (like houses or cars) and present you those options
market creator - like a flea market, they provide the space to bring buyers and sellers together, in e-commerce would be like Etsy
online service provider - provides a service like taxes (turbo tax)
community provider - online meet up spaces like Facebook, and you can make money off of it
portal - jumping off point onto the internet
Revenue modules - how are we generating revenue and creates profit
unit sales - get it directly from distributors
subscription model - a recurring expense and continuing access to it (Spotify)
advertising - stickiness (what sticks) most widely used revenue for e-commerce
fees / commissions - a flat rate paid for a service or access to it
Affiliate pricing - people get paid for linking a product
freemium - basic version is free but you have to pay for the better stuff
(10.3). E-commerce & Marketing
Internet effects
New ads formats - we have search, banner, and pop-up ads that we didn’t have before
Long tail marketing - ability of firms to market goods profitability to very small online audiences, largely because of the lower costs of reaching very small market segments
Goals of marketing on social media
leverage of influence - ex. Someone posting about a new car so people buy it
target shared interests - ex. Groups
influence - timelines, newsfeed, collaborative
Shopping
social e-commerce - use of social networks to share knowledge about items of interest to other shoppers and, increasingly, to enable purchases directly via the social network
wisdom of crowds - two heads are better than one mindset, belief that large numbers of people can make better decisions than one person
crowd sourcing - uses large internet audiences for advice, market feedback, new ideas, and solutions to business problems; allowing anyone to make a solution and pick the best one (ex. Doritos Super Bowl ad)
Behavioral targeting - tracking online behavior of individuals so we can understand & market to you better
Cookies - small text files that allow this
allows for:
1. Personalized content
2. Programmatic ad buying
3. Native ad (seems natural)
(10.4). B2B E-commerce
Electronic data interchange (EDI) - enables the computer-to-computer exchange of standard transactions such as invoices, bills of lading, shipment schedules, or purchase orders, between two organizations
New ways of B2B
private networks - typically consist of a large firm using a secure website to link to its suppliers and other key business partners
B2B market prices - provide a single, digital marketplace based on internet technology for many buyers and sellers
exchanges - independently owned 3rd party B2B e-commerce marketplaces that connect thousands of suppliers and buyers for spot purchasing
(10.5). M-commerce
m-commerce - involves the sales of goods and services via mobile devices, such as smartphones, tablets, and wearables
Areas of growth
mass marketing retailing
sales of digital content
in-apps sales on mobile devices
Areas of application
location-based services (geo social) - include geo social, geo advertising, and geo info. services
geosocial services - can tell you where friends are meeting
banking & finance
mobile app payment systems - use mobile apps to replace credit cards and traditional banking services
near - field communication (NFC) - driven systems enable NFC-enabled smartphones and other mobile devices to make contactless payments (Apple pay, google pay, etc)
QR Code payment systems - use a contactless payment method, its initiated by scanning a QR (quick response) code using a mobile app not the payers smartphone (Walmart pay)
Peer to peer (P2P) payment systems - used for transferring money among individuals who have installed a proprietary app (Venmo or Zelle)
(8.1) chapter 8 - Security
Reasons IS are vulnerable
concepts
security - those policies and measures that are used to prevent unauthorized access, alteration, or theft to your system
controls - whatever policies we have that secures or ensures the safety of our assets
categories of vulnerability
hardware & software - dry hard to make secure with it being $
disasters - natural disasters that could harm our systems
mobile - more on the go data accessibility the higher the chances that you may lose it, drop it, or it may get stolen
interact/networks -all our devices are connected to a network, meaning that anyone anywhere could get into the system
wireless - much easier to hack the wireless network
malicious software (malware)
malware - software that is written with the purpose to do harm
categories
virus - designed to attach themselves to a specific file typically destroys files(get it from someone who already has it)
worm - spreads automatically installs itself once and looks for other computers to infect (replicates themselves)
Trojan - malicious programs that disguise themselves as something helpful but instead harms the computer (drive by download)
spyware - loaded onto system that watches what you do
key logger-keeps track of what you do
ransomeware - unauth. access, hold info. hostage until pay
cybercrime & cyber vandalism
hacker - unidentified person who gets unauthorized access to someone info.
cyber vandalism - wants to create a scene or statement
botnet - have infected devices do an action together (like flood Ticketmaster for fake requests for purchases
Distributed denial-of-service attack (DDoS) - attack that uses numerous computers to inundate and overwhelm a network from many launch points
cyber crime - trying to make money off of hacking efforts
ransomware - get unauthorized access to system and hold information hostage until you pay me for new passwords (org)
identity theft -gets enough of your personal info. pretend to be you and spend money in your name
spoofing - pretend to be someone else
phishing - sending an email trying to get people to give them their personal info.
pharming - trying to get you to a website that is similar to the one you wanted but isn’t, trying to get your personal information
sniffing - easier to tap into wireless and uses a software to intercept signals and extract information
evil twin - looks like legitimate wireless network but it is not
internal threats - biggest threats, own employees
social engineering - biggest threat is employees, let them in because it’s nice or it looks ok
software bugs - issues with security
(8.2) Business value of security
increased vulnerability due to:
amount of data
access to private info
security breach effects
electronic evidence & computer forensics
electronic evidence - information stored off transmitted in digital format that can be used as proof in legal proceedings like emails, documents, social media posts, and more
computer forensics - the scientific collection, examination, authentication, preservation, and analysis of electronically stored information (ESI) in such a way that the new info can be used aes evidence in a court of law
4/10 Online Classwork
(8.3) Risk assessment and security policy
Informations systems controls - both manual and automated and consist of general and application controls
general controls - overall control environment governing the design, security, and use of computer programs and the security of data files in general throughout the organization’s information technology infrastructure
software controls - monitor the use of system software and prevent the unauthorized access and use of software programs, systems software, and computer programs
Hardware controls - ensure that computer hardware is physically secure and check for equipment malfunction
computer operations controls - oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data
data security controls - ensure that the valuable business files are maintained internally or by an external hosting service are not subject to unauthorized access, change, or destruction while they are in use or storage
implementation controls - audit the systems development process at various points to ensure that the process is properly controlled and manages
administrative controls - formalized standards, rules, procedures, and control disciplines to ensure that the organization’s general and application controls are properly executed and enforced
application controls - specific controls unique to each application that ensure that only authorized data are completely and accurately processed by that application
input controls - check data for accuracy and completeness when the data enters the system
processing controls - establish that data are completely and accurately processed during updating
Output controls unique- ensure that the results of computer processing are accurate, complete, and properly distributed
Risk assessment - determine the level of risk to a firm if a specific activity or process is not properly controlled
Security policy - consists of statements ranking information risks - identifying acceptable security goals, and identifying the mechanisms for achieving these goals
Acceptable use policy (AUP) - acceptable uses of the firms information resources and computing equipment and specifics consequences for noncompliance (laptops, cell phones, and the internet)
Disaster recovery planning - devises plans for the restoration of disrupted computing and communications after they have been disrupted
Business continuity planning - focuses on how the company can restore business operations after a disaster strikes
Information systems audit - examines the firm’s overall security environment as well as the controls governing individual information systems
Worst passwords list answer this question :
why are passwords so commonly used if they aren’t particularly effective?
Passwords are still comply used because they offer a simple and familiar way to protect information, they are also easy to implement, cost effective, and provide at least a basic level of security
(8.4) Tools, encryption, system availability
watch the figure 8.3 video on public key encryption in the textbook and complete the quick check objective in 8.4
STOP AT PAGE 299 (securing transactions with blockchain)
Identify and access management (IAM) - software that automates the process of keeping track of all these users and their system privileges, assigning each user a unique digital identity for accessing each system
Zero trust - cybersecurity framework based on the principle of maintaining strict access controls and not trusting anyone or anything by default, even those behind a corporate firewall
Least privilege access - no user should have access to system resources beyond what is absolutely necessary to fullfill that user’s specified tasks
Authenticaiton - the ability to know that people are who they claim to be
Passwords - a word or number used for authenticating users so that they can access a resource
Security token - a physical device that is designed to prove the identity of a single user
Smart card - a device, shaped like a card, that contains a chip formatted to access permission and other data
Biometric Authenticaiton - uses systems that read and interpret individual human traits, like face ID, finger prints, or voices, to grant or deny access
Multifactor authentication (MFA) - tools that increase security by validating users via a multistep process
Two-factor authentication - a subset of MFA that requires two credentials
Firewalls, intrusion detection, and preservation systems, and anti-malware software
Firewalls - prevent unauthorized users from accessing private networks
Static packet filtering - examines selected fields in the headers of data packets flowing back and forth between the trusted network and the internet, examining individual packets in isolation
Stateful inspection - provide additional security be determining whether packets are part of an ongoing dialogue between a sender and receiver
Network Address translation (NAT) - can provide another layer of protection when static packet filtering and stateful inspection are employed
Applicaiton proxy filtering - examines the application content of packets
Intrustion detection and prevention systems
Intrustion detection systems (IDS)- tools to monitor the most vulnerable points in a network to detect and deter unauthorized intruders
Intrusion prevention system (IPS) - system that has all the functionality of IDS & can take steps to prevent and block suspicious activites
Anti-maleware software - software designed to detect, and often eliminate, malware from an information system
Unified threat management - comprehensive security management tool that combines multiple security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software
Encryption and public key infrastructure
Encryption - the process of transforming plain text or data into cipher text that can’t be read by anyone other than the sender and the intended receiver
Transport layer security (TLS) - enables client and server computers to manage encryption and decryption activities as they communicate with each other during a secure web session
HTTPS - secure version of HTTP protocol that uses TLS for encryption and authentication
Public key encryption - encryption using two keys: one shared or public and one private
Digital certificates - method of establishing the identity of users and digital assets
Public key infrastructure (PKI) - the use of public key encryption working with a CA, is now widely used in e-commerce
(4.1) IS & Ethics
Tech trends that affect ethics
Doubling of computing power - computer processors have gotten more powerful and cheaper as we begin to rely on them
Cheap data storage - since it is so inexpensive, we store basically everything forever
Better network - can access information from anywhere
Increased use of mobile - can track location and the things you do
Better data analysis (profiling) - as computer process we have better analysis that can tell us more, (profiling - storing info about you specifically)
AI - no human data, judgement of data deciding if things have been taken too far (causing most ethical issues)
(4.2) Ethical Principles
Concepts
responsibility - someone accepts the obligations and rights for whatever decisions have been made
Accountability - the ability and mechanisms in place to figure our who is responsible
Liability - if there are damages from the decisions that are made, we can find a way to recover any damages done
Legal - permissible conduct by the government standards
Ethics - principles of right and wrong that guide a persons behavior
Morals - society and culture where you are raised and learn
Ethical dilemma - no clear cut right or wrong, you are forced to take an action
Analysis - response determined by:
Basic ethical structure - basic values and culture you were raised on
Ethical principles
Golden rule - do unto others as you would have them do unto you
Categorical imperative - if an action is not right for everyone it is not right for anyone
Rule of change - “slippery slope” if an action can’t be taken repeatedly then it can’t be taken at all
Utilitarian - you take the action that creates the greatest good
Risk of aversion - create the outcome that creates the least harm
“No free lunch” - everything belongs to somebody and they are going to get paid
(4.3) IS Challenges
3 types of IS Challenges
Information rights
Property right and bligatios
Quality of life issues
Information rights
Privacy - the right to be left alone free from surveillance and interference (very easy to be invaded now)
1st amendment - freedom of speech (kind of covers it)
4th amendment - protect from the government searching and invading
Privacy act - what the gov can and cannot do with your information
Fair information practices
HIPAA - health informaiton privacy
FERPA - education privacy
COPPA - childrens online protection (what info websites and collect on kids)
FCRA - Fair credit reporting act (what financial institutions can do with infos)
GDPR - european union law
IS Challenges
Cookies - small text files that get put on you devices to put some essential info in it to recognize you the next time you login
Spyware - monitoring online behavior without knowledge
Google services/ behavioral targeting - google has rights to your information
AI
Facial recognition
Regulation
Self recognition via:
Privacy systems
Opt in vs. opt out - opt in is stronger for protecting the consumers privacy
Informed consent
Tech solutions to info being shared
Email encryption
Anonymity tools
“private “ browsing
Cookie managers
Ad blockers
Property rights
Intellectual property - intangible creative work
IP Categories
Copyright - covers the expression of an idea (books, movies, etc.) lasts as long as the life of the creator plus 70 years, just mark it as copyright and show you created it (nowhere to file) you have to be your own copyright police
Patent - cover an invention, good for 20 years, file for it with US office of patent and trade
Trademark - any identifying word, phrase, or symbol that identifies your work, lasts as long as the company protects it (forever, in propertuity), file for it
Trade secret - an intellectual work product that is distinct to whatever you do “secret recipe”
IS Challenges
Digital works are easy to alter, replicate, and distribute
Difficult to establish uniqueness
Generative ai - calls employment into question since its taking jobs, very unclear who actually owns it
Legislation
1998 DMCA - (digital millennium copyright act) put restrictions on what certain things are held accotnable for
1909 copyright act
Fair use doctrine - can’t show things in class since its copyrighted but can show for education purposes not profit
(4.4) Quality of Life
System of quality - can never be perfect
What is an acceptable level? - cna never be 100% so we try to get as high as possible but is a constant battle due to updating technology
Problems include:
Software bugs
Hardware failures
Poor data input quality
Accountability and control
Who is responsible? - how to find out who is accountable for whatever the unethical mistake or bug is
Computer crime (illegal) vs. computer abuse (unethical, like spam)
Spam - unsolicited emails or texts that is an overwhelming amount
Quality of life
Dependence and vulnerability - the more we use and depend on technology, the more we are vulnerable to it
Balancing power
Equity and access - “digital divide” - a difference in people’s materials and accessibility to technology (such as high speed internet)
Boundaries - with increase in accessibility to work materials what are the boundaries of work/home life
Employment - evolving tech is putting people out of jobs
Health risks - Health issues that come with technology being used everyday and not everyone knows them (carpal tunnel, arthritis, eye strain, vision issues)