The principal
subject of e-Commerce

Access Control
and Security
E-Commerce
processes have to build trust and secure access various parties in e-commerce
transactions, through user authentication, access pengotorisasian, and
implementation of security features. For example, these processes build an
e-commerce site for customers to tell who they are by name and passwords,
encryption keys, or certification and digital signature. E-Commerce sites must
then authorize access to only those parts of the site accessible to every user
needs to complete the transaction. So, you will usually be given access to all
the resources of an e-commerce website, ecuali account of another person,
company data is limited, and administrative areas
webmaster.Perusahaan-companies doing B2B e-commerce can rely on the exchange is
limited to obtaining goods industry and services, or through a trade portal
site which allows only registered customers are accessing information and
trading application. Other security processes to protect the resources of
e-commerce sites from various threats such as hacker attacks, theft of
passwords or credit card numbers, and system failures. We will discuss many of
the threats and security features in a future post.
Creating Profiles
and Personalization
Once
you have gained access to an e-commerce website, profile creation process can
be run to collect data about you and your behavior and choices of your Web
site, and build electronic profiles of various characteristics as well as your
preferences. User profiles developed using the profiler tool such as
registration, cookie files, software searcher behavior in Web sites and user
response. This profile is then used to recognize you as an individual user and
gives you tam [ilan personalization of the various contents of the site, as
well as product advice and personalized Web ads as part of a personalized
marketing strategy. Profile creation process is also used to help authenticate
your identity for the purpose of account management and payment, as well as to
collect data on customer relationship management, marketing planning, and
management of web sites. Some of the ethical issues in the user profile
creation have been discussed in a previous post.
No comments:
Post a Comment