Skip to main content

Posts

Showing posts from April 16, 2014

Key Dimensions of Security

Key Dimensions   ·          Integrity: Ability to ensure that information being displayed on a web site or transmitted/received over the Internet has not been altered in any way by an unauthorized party. Content should be unaltered. ·          Non repudiation: Ability to ensure that e-commerce participants do deny (repudiate) online auctions. Eg: Phishing(cloning of a website) occurs for online web portals of banks.  ·          Authenticity: Ability to identify the identity of a person or entity with whom you are dealing on the Internet. ·          Confidentiality : Ability to ensure that messages and data are available only to those authorized users to view them. ·          Privacy: Ability to control use of information a customer provides about himself/herself to a merchant. Privacy is a very big issue online. We are continuously being tracked. We need to be vigilant. ·          Availability: Ability to ensure that the data/info

EDI(Electronic Data Interchange)

EDI(Electronic Data Interchange)   Traditional way of EDI EDI is an electronic exchange of business documents in a standard computer processable universally accepted format between the trading partners. It is different from e-mail/file sharing on network as both the trading partners have to agree on a common format of business documents that is to be send as data files over electronic message device. Once the data which is entered in desirable format it can be easily computed to and fro.   Reorder level: Ordering after a certain level/limit eg: barcode The repeated keying of identical information in the traditional paper based systems creates a number of problems such as increased time, low accuracy, high labor charges, increased uncertainty. EDI maintains common electronic format for business document such as purchase order, request for quotation, invoice etc. These are called electronic transaction sets. The communication occurs between computer and c