Académique Documents
Professionnel Documents
Culture Documents
Objectives :
to make web sites more responsive to each user’s needs.
to provide users with information with higher quality
Methodology:-
1. User Profiling
a process to get to know the users
by collecting their information
by guessing their interests/needs
Implicit input:
from user’s interactions with the web site
example: clicking and purchasing activities
2. Recommendation
To search for suitable products
To promote products
Information Filtering:-
base on user’s interests
Example:
1
Interest: Computers, low costs
User Profile
Collaborative Filtering
base on what other like-minded users like to do
Example:
Item
1 … 50 Phone Camera
User
A
B
User A = Predicator for user B
User B = Predicator for user A
Revenue Model:-
Describes how the firm will earn revenue, generate profits, and produce a superior
return on invested capital
Terms financial model and revenue model often used interchangeably
Major types:
Advertising revenue model
Subscription revenue model
Transaction fee revenue model
Sales revenue model
Affiliate revenue model
3
Government regulations
Geopolitical issues
Partner Intelligence
• Monitoring activities of
Company’s major suppliers
Strategic partners
Competitor Intelligence
• Detailed monitoring & analysis of
Key competitors
High-level scans of other competitors
Ongoing identification of new entrants
Technical Intelligence
• Monitoring advancements of
Technical developments
Customer/Prospect Intelligence
• Determining & monitoring
Key internal influences
Budget cycles
Key focus areas
4
3. RESET – Umm.. I
have no idea why you
are talking to me
1. SYN –
Let’s have a
4. No connection –
conversation
Guess I need to take Bob
out of the picture…
Attacker - Eve
Chaffing :-
Chaffing -> adding fake packets with bogus MACs. MAC based on sequence number
and message.
Winnowing -> discarding packets with bogus MACs
1, Hi Bob, 462312
2, Meet me at, 782290
3, 7 PM, 238291
,
4, Love Alice 839128
1, Hi Bob, 462312
1, Hi Larry, 388231
2, I’ll call you at, 562381
2, Meet me at, 782290
3, 7 PM, 238291
3, 6 PM, 823911
4, Yours Sue, 728377
4, Love Alice, 839128
5
Chaffing will normally add at least one chaff packet for each wheat packet.
MIME
defines new message header fields
defines a number of content formats (standardizing representation of multimedia
contents)
defines transfer encodings that protects the content from alteration by the mail system
6
quoted-printable
– non-ASCII characters are converted into hexa numbers (e.g., =EF)
base64 (radix 64)
– 3 8-bit blocks into 4 6-bit blocks
x-token
– non-standard encoding
S/MIME services
enveloped data (application/pkcs7-mime; smime-type = enveloped-data)
– standard digital envelop
signed data (application/pkcs7-mime; smime-type = signed-data)
– standard digital signature (“hash and sign”)
– content + signature is encoded using base64 encoding
clear-signed data (multipart/signed)
– standard digital signature
– only the signature is encoded using base64
– recipient without S/MIME capability can read the message but cannot verify
the signature
signed and enveloped data
– signed and encrypted entities may be nested in any order
PGP services
messages
– authentication
– confidentiality
– compression
– e-mail compatibility
– segmentation and reassembly
key management
– generation, distribution, and revocation of public/private keys
– generation and transport of session keys and IVs
Message authentication
based on digital signatures
supported algorithms: RSA/SHA and DSS/SHA
7
Ksnd -1
sender
m h σ
hash enc
m h h σ
hash compare dec
ce
er
re
iv
Ksnd
accept / reject
Message confidentiality
symmetric key encryption in CFB mode with a random session key and IV
session key and IV is encrypted with the public key of the receiver
supported algorithms:
– symmetric: CAST, IDEA, 3DES
– asymmetric: RSA, ElGamal
m
prng Krcv
{k, iv}Krcv
sender
s.enc a.enc
k, iv
{m}k
Compression
applied after the signature
– enough to store clear message and signature for later verification
– it would be possible to dynamically compress messages before signature
verification, but …
– then all PGP implementations should use the same compression algorithm
– however, different PGP versions use slightly different compression algorithms
applied before encryption
– compression reduces redundancy ® makes cryptanalysis harder
8
supported algorithm: ZIP
• Metadata
o Information about information
o Structured data about data
9
o To share names, and meanings (shared semantics)
10
Ethics and legality of web tracking
Truly representative samples
Cookies :-
Cookies: small text file that Web sites place on a visitor’s client computer every time
they visit, and during the visit as specific pages are accessed.
Cookies provide Web marketers with a very quick means of identifying the customer
and understanding his or her prior behavior
Location of cookie files on computer depends on browser version
Web Bugs :-
Tiny (1 pixel) graphic files embedded in e-mail messages and on Web sites
11
Used to automatically transmit information about the user and the page being viewed
to a monitoring server
e-Tendering :-
• E Tendering is a process of carrying out entire Tendering Cycle Online including
submission of Price Bid such that Efficiency, Economy, Speed of Internet can be
harnessed.
• E Tendering Cycle can be broken in Key Modules
Benefits to Suppliers/Contractors
• Anytime & Anywhere Bidding
• Fair, Free and Fearless participation for vendors.
• No dependence on Newspaper, Courier, Banks,…
• Zero Administrative hassles
• Can carry out all activities from any computer
• Economical – saving on Traveling cost
• Reduces efforts & cost of bidding
• No tenders can be missed because of distance
• Can submit bid on last minute
12
• Content not sharable
• Physical Security
• Wastage of space to store bids
• Not retrievable
• Ideal till 2003
E - Tendering System
• Shorter Procurement Cycle
• Economical – Fixed Cost
• Environmentally Friendly
• Anytime – Anywhere Bidding
• Bidding possible on Holidays
• Automated & Accurate process
• Shareable Content
• Foolproof Security
• Lifelong storage on CD
• One click access to bids
• For year 2004 & Beyond
dynamic pricing
Fluctuating prices that are determined based on supply and demand relationships at
any given time
13
One Buyer, One Seller
One Seller, Many Potential Buyers
forward auction
An auction in which a seller offers a product to many potential buyers
sealed-bid auction
Auction in which each bidder bids only once; a silent auction, in which bidders do not
know who is placing bids or what the bid prices are
Vickrey auction
Auction in which the highest bidder wins but pays only the second highest bid
Benefits of E-Auctions
Benefits to sellers
Larger reach and increased revenues
Optimal price setting
Removal of expensive intermediaries
14
Liquidation
Lower transaction costs
Lower administrative costs
Better customer relationships
Benefits to buyers
Opportunities to Find Unique Items and Collectibles
Lower prices
Anonymity
Convenience
Entertainment
Benefits to E-Auctioneers
Higher repeat purchases
A stickier Web site
Expansion of the auction business
Limitations of E-Auctions
Possibility of fraud
Limited participation
Security
Auction software
Long cycle time
Monitoring time
Equipment for buyers
Order fulfillment costs
Double Auctions
single auction
Auction in which at least one side of the market consists of a single entity (a single
buyer or a single seller)
double auction
Auction in which multiple buyers and sellers may be making bids and offers
simultaneously; buyers and their bidding prices and sellers and their asking prices are
matched, considering the quantities on both sides
15
Failure to pay
Failure to pay the auction house
High shipping costs and handling fees
Failure to ship merchandise
Loss and damage claims
Fake escrow services
Switch and return
Other frauds
E-Supply Chains :-
• Definitions and Concepts
supply chain
The flow of materials, information, money, and services from raw material suppliers
through factories and warehouses to the end customers
e-supply chain
A supply chain that is managed electronically, usually with Web technologies
16
e-supply chain management (e-SCM)
The collaborative use of technology to improve the operations of supply chain
activities as well as the management of supply chains
– The success of an e-supply chain depends on:
• The ability of all supply chain partners to view partner collaboration as
a strategic asset
• Information visibility along the entire supply chain
• Speed, cost, quality, and customer service
• Integrating the supply chain more tightly
Bullwhip effect
Erratic shifts in orders up and down supply chains
17
– It includes:
• Product pricing
• Inventory
• Shipping status
• Credit and financial information
• Technology news
EDI :-
EDI is sometimes called paperless trading. It is used for trade transactions such as orders and
invoices.
The transfer of structured data, by agreed message standards,from one computer system to
another,by electronic means.
18
- EDI messages are sent from one computer system to another without the need for -manual
intervention.
- Some small suppliers may not have fully automated systems and could simply print out the
EDI order.
- EDI will also be used for other trade transactions such as delivery note, invoice and
payment.
EDI software:
Translate transaction into the EDI format and transmit into the network.
Interrogate the network for any EDI messages, retrieve them and then translate for the
application.
The normal approach is to buy EDI software.
Interfacing an application to EDI is normally a sizeable (and hence expensive) undertaking.
19
Customer Supplier
EDI Agreement
Inland Revenue.
Dentists claiming NHS fees.
EDI Advantages:
Speed of transaction.
Error reduction – no keying errors.
Cost cutting – no data entry staff.
Reduced stock holding – just-in-time
Business opportunities.
Cash flow – quicker payment of invoices.
20
Deep linking :-
Hyper linking is linking from one site or location to another.
Deep linking is linking from one web site to another website by means of a hyperlink
to a web page other than the home page.
Shallow linking is a link or pointer to an index or home page.
Introduction to FireWire:-
• FireWire is the Apple trademark for the IEEE 1394 standard
• Sony refers to their implementation as i.Link
• It is the industry standard for high-performance device connections
History of FireWire
• Introduced by Apple in 1995 as IEEE 1394-1995
• In 2000, the standard received minor revisions and was renamed 1394a
• In 2002, the standard received major revisions and was renamed 1394b
Advantages of FireWire
• Device communication is peer-to-peer
• A “root node” is elected by all the devices on a bus
• The root node coordinates all activities on the bus
• A new root node is chosen within 300 microseconds of any addition or removal of a
device from the bus
Uses of FireWire
• Digital multimedia (audio and video)
• Other uses:
– Printers
– Scanners
– External hard drives
– Optical disk writers (CD/DVD±R/RW)
– Video game consoles
Push Vs Pull :-
Push technology is a set of technologies used to send information to a client without
the client requesting it
Push versus Pull
Pull technology is based on the traditional request/reply model. It requires
that users know a priori where and when to look for data. It suffers from
transmission latency and duplicate data traffic.
21
Push technology allows users to get information as soon as it become
available and users do not have any knowledge about virtual information
servers. This transfer of control from users to providers is a potential
problem.
Focus is on Multicast-base push protocols
Multicasting is a 1-to-n form of communication for transmitting packets from one
host to a set of member hosts in the same group
focused primarily on page creation and focused primarily on storage and archiving
editing
provides a very powerful publishing engine limited web publishing engine typically produces
(templates, scripting, etc) one page for each document
Blogs :-
A blog / weblog is
A web page containing brief entries arranged chronologically
Can be like
A journal or diary
A ‘What’s New’ page
A page of interesting links
They have been called personal web publishing communities*
Weblogs don’t stand alone
Relate / link to other blogs and the world
Connect people together with a common interest
Terminology :-
Blogger – person who maintains a blog
Blogging – the act of creating a blog
Blogrolling – moving from blog to blog
22
Blogorrhea – hundreds of posts per day about anything
E-Procurement :-
Using internet or intranet based information systems software to coordinate the
buying, shipping, inventory management, supplier selection, and approval process of
vital business acquisitions within the organizations core competency.
23
Order Record Storage & Organization
Order Reviews
Benchmarking
Comparative Analysis
Software Tool
Preliminary Actions
Coordinates inventory management systems with purchasing systems.
Coordinates new business ventures with purchasing systems.
Creates List of Needed Items (Inputs)
Archives that List
Preliminary Actions
Maintains Record of Suppliers
Maintains Record of Supplier Profiles
Maintains Record of Supplier Capabilities
Maintains Record of Negotiated Prices
Maintains Record of Negotiated Terms
Maintains Record of Contracted Limitations
Buying Actions
Sends Purchase Order Delivery directly to Supplier
Maintains Real-time Order Status
Records Order Delivery timing
Records Order Accuracy
Records Order Inspection Data
Submits Payment Request
Coordinates Payment Approval Process
Concluding Actions:
Sends Electronic Receipts to suppliers, archives, managers
Maintains on-demand records for order reviews
Allows reports and analyses for benchmarking
Facilitates comparative and costs analyses
Benefits
Streamlines procurement process
Increases communication
Increases procurement speed
Eliminates non-value added personnel
Reduces DEAD time
Provides records
Produces reports
Facilitates improvements
Detriments
24
Limits flexibility for extensive notations
Poor performance for exception items
Digital Divide :-
The gap in:
Information communication technology
The Internet use
The gap between various:
Income
Age
Gender
Ethnicity
Language
Geography
Family, company size
Result:
Less access
Lack of information
Impact
Business
Science
Education
Slowing down of the society
Online Advertising :-
Paid message on a Web site, online service or other interactive medium, such as
interactive messaging
Advantages:
Ability to target ads to narrow segments and track performance in almost real
time
Provide greater opportunity for interactivity
Disadvantages:
Concerns about cost versus benefit
Concerns about how to adequately measure results
25
Pop-unders: Open underneath user’s active browser window and do not appear until
user closes active window
Rich media ads: Employ Flash, DHTML, Java, streaming audio and/or video
Interstitials: Provide way of placing a full-page message between current and
destination pages of user
Superstitials: Rich media ad that is pre-loaded into browser’s cache and does not
play until fully loaded and user clicks to another page
26
Public relations: Involves communicating with target audiences, or publics, using
methods other than advertising
Viral Marketing :-
• Online advertising that propagates itself and spreads rapidly through social network
groups.
• Spreads like a virus each new contact point can spread to multiple contacts
E-commerce Architecture:-
27
28