1 In what ways does KM knowledge management support ecommerc
1. In what ways does KM (knowledge management) support e-commerce?
2. Enter fleetmatics.com and find its major tracking systems for fleets (vehicles) and summarize its capabilities and benefits.
3. What is the relationship between mobile sales force automation, mobile field force automation, and mobile CRM?
4. How do business-oriented networks and enterprise social networks differ?
5. B2C EC sites continue to experience DOS attacks. How are these attacks perpetrated? Why is it so difficult to safeguard against them? What are some of the things a site can do to mitigate such attacks?
Solution
KM has important effects and benefits could lead the organizations to build new strategy or develop the efficiency of the business processes and
support the decision making processes.
Because the digital world is growing,it become impottant to musiness men to do their work with their computer in any where in the world
Any user is going to fully understand the E-Commerce processes and techniques if the understood the KM
2.
The obvious and most basic benefit of all vehicle tracking systems is always knowing where your company vehicles are. But what other benefits can you see with tracking that will help you achieve your business goals? GPS vehicle tracking is so much more than just knowing where your vehicles are. Implementing even the most basic of vehicle tracking can help you reduce operating costs, increase fleet security and safety, improve customer service and more.
REDUCE UNAUTHORIZED VEHICLE USE
CONTROL FLEET FUEL COSTS
REDUCE LABOR COSTS
INCREASE PRODUCTIVITY
3.
Sales force automation (SFA) software is a type of program that automates business tasks such as inventory control, sales processing, and tracking of customer interactions, as well as analyzing sales forecasts and performance. Businesses may have a custom version developed specifically for their needs, or choose from among the increasing number of sales automation software products, such as Interact Commerce\'s ACT! and GoldMine Software\'s GoldMine. Sales automation software is sometimes called sales automation software, and sometimes called customer relations management ( CRM ) software.
Field Force Automation Solution
Idea Field Automation (FFA) is a mobile CRM Tool that helps to speed up and streamline all phases of business from prospecting, lead management, sales tracking, stock, services and order management.
Key Advantages to Enteprises
Pay as use model
Work while on the move
Field staff empowement
Incresed efficiency & productivity
Faster customer Response
Improved decision making
Mobile CRM lets your mobile or remote employees use mobile devices such as smartphones and tablets to access, update and interact with customer data wherever they are. The best mobile CRM solutions let mobile workers do everything they could do with CRM at their desktop, with the addition of advanced mobile CRM features.
A social network is defined as a place where people can create a personalized homepage writing about events in their lives, post pictures of the family, short video’s, music, post and exchange thoughts and ideas, and link to their friend’s websites; in essence, they create their space on the internet. They can even tag, or create hashtags (#thisisme) for their content, add keywords, so the content is searchable. Others can comment, like, or share your content should you allow them to do so (Turban, 2012).
Mobile devices play a big role in social networking; enter mobile social networking. Users can let their social network know that they’re checking in at a local restaurant for dinner, or they’re at a favorite watering hole watching a live band. They can even post pictures as well as live videos of the event. Many entertainers encourage people attending these events to share their experience as it is free advertising and helps to increase sales of their products such as music or films. Data has shown that mobile social networking has increased subscribers by substantial amounts; the number of mobile subscribers accessing Facebook increased over 100% in one year from2009 to 2010 (Stackpole, 2012). Two basic types of mobile social networks exist; companies are partnering up with wireless carriers such as Yahoo and MySpace via AT&Ts wireless network, and companies that do not have such relationships with cell companies; they use other means in which to attract users such as mobile apps. Examples of these include Classmates.com and Couchsurfing.com.
Business Oriented sites, also known as professional social networks, primary objective are to foster business relationships amongst its members and subscribers. Examples of these sites include LinkedIn, ViaDeo, and Zing.
Many businesses are increasingly using these sites to increase their business contacts, especially in a global economy. Social networks make it easier to maintain contact with colleagues around the world. Companies can advertise businesses services and products. They can show expertise in their field using multiple media including educational presentations, articles, videos; all at virtually no cost to host. This low cost is especially beneficial to small companies. The small business can contact potential customers on the other side of the world. This type of connection was impossible ten years ago.
5.
Fraud Protection Denial-of service attack B2C EC sites continue to experience DoS attacks. Botnet
Dos Attack
Identity theft
How are botnets, identity theft, DoS attacks, & website hijackings perperated? Discuss some of the difficulties of eliminating online financial fraud. Under what circumstances does this make sense? Discuss. Gathering system information.
Stealing protected storage information, FTP passwords, and POP3 passwords.
Stealing online credential information as specified by a configuration file.
Contacting the command and control server for additional tasks to perform. Find info about the Zeus Trojan. Gillian Chow
Yue Fang, Lim Very difficult to detect even with up-to-date antivirus software due to being stealthy.
Its malware family is considered the largest botnet on the Internet:
steals banking information & important credentials by Man-in-the-browser keystroke logging and Form Grabbing
Spread mainly through drive-by downloads and phishing schemes Some companies prefer not to have disaster recovery. Q&A an attack on a website in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources large number of request
bombard the system
consume its resources
crash service
flood service can only be detected after problem occur
attack many computers at once Firewall: cannot distinguish between good and bad networks
Soft and hardware
Routers
DMZ How are these attacks perpetrated? Why is it so difficult to safeguard against them? What are some of the things a site can do to mitigate such attacks? Consider how a hacker might trick people into giving him/her user IDs & passwords to their Amazon.com accounts. What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? 1 2 3 4 5 8 Discuss why it is so effective as a financial data stealer. Why is it so difficult to mitigate this Trojan? Disaster recovery recovery of info after catastrophic event
insurance does not cover data not small task
cost a lot
a lot of effort
not worth if not done properly
requires a lot of resources
cost of recovery all companies should have
data important element
lost data cost much higher
maintaining the availbility The internet’s vulnerable design
Phishing attacker
The internet underground economy
Keystroke Logging
illegal access
illegal interception
data interference systems interference
misuse of devices
identity theft
electronic fraud Social Engineering Information Security is essential for any organization ‘to continue to be in business’. If information security is not given priority, especially in the current environment with the threat of terrorism looming in the background every day
The cost of loss of reputation and goodwill, which can erode a company’s base in the long run Why are they so dangerous to e-commerce? E-commerce industry does not want to enforce safeguards that add friction to the profitable wheels of online commerce.
Credit card issue try to avoid sharing leads on criminal activity with each other or law enforcement.
Online shopper fail to take necessary precautions to avoid becoming a victims.
Info security designs and security architectures are still incredibly vulnerable.
Organisations fail to exercise due care in business or hiring practices, outsourcing, and business partnership. Botnet consist of a group of computers known as \"zombie\" computers that have been compromised by drive-by-downloads of software that can be controlled by hackers with malicious intent.
installed on your computer without your knowledge or consent is used to breach network security and stage denial of service attacks on network systems or to perform criminal acts through spamming.
hold a computer captive for the purpose of criminal activity and there are literally millions of botnets formed on the Internet on a regular basis.
the bots and the codes that make up a botnet are made available online where the bot herders can combine codes to create a major denial of service attack to bring down networks and websites. Identity theft a serious crime affecting millions of people a year and accounting for the loss of billions of dollars every year
stealing someone\'s identity in which someone pretends to be someone else by assuming that person\'s identity, typically in order to access resources or obtain credit and other benefits in that person\'s name.
Lost:
personal information ie. Cards, documents, password
Financial accounts and credit information
Fina


