Premium Essay

E-Payment System and Securing Their Database Report

In:

Submitted By dlajkt
Words 2637
Pages 11
You Decide
E-payment system and securing their database Report
Prepared for:
Book Bunker
By: Your Name
Ideas and Strategies for utilizing e-payment system and securing their database
February 12, 2014
David E-marketing and E-commerce Consultancy
Executive Summary (Situational Analysis)
What constitutes business success? Is it your skills in terms of product innovation, your ability to deliver in terms of products and services demanded by your customers? Yes, these are what constitute business success. However, what happens if you have the best products, the best initiatives in terms of what customers want but you are not known? How then can you say you have a successful business?
The solution to this is an e-payment system (this is a way customers can pay for your products and services from a mobile device and or using your website). People today live with the use of all technology, they carry their mobile devices everywhere they go whether going to work, the store, or even when they are just sitting at home watching TV. With this much technology that people carry with them you can utilize an e-payment system to the full advantage. E-payment is a way customers can pay for your service or pay for and purchase products from you from their mobile device or from their computer from the comfort of their own home.
Ideas and Strategies for utilizing e-payment system and securing their database
Now days, life has become very fast. Most of the people do not prefer going to shops for shopping. Instead they prefer to do the same by sitting at home and ordering online. Thanks to the advancement of technology. It has brought the entire world within the grip of our hands.
Just a click of a mouse on the computer can perform transactions of thousands and lacs. Thus most of the business today is taking place online. This feature is termed as e-commerce.
E commerce

Similar Documents

Premium Essay

Ecom 210 Week 6 Devry

...Your Assignment You are an e-marketing and e-commerce consultant. Mary and Joe Johnson, the owners of Book Bunker, have hired you in the past to help them improve their sales both online and in their store. Now they need help developing an e-payment system and securing their database. They have asked you to create a plan to collect payments via their website and ensure that the transactions are safe and secure. YOU DECIDE Activity or Assignment Assignment For this assignment, you will generate a Microsoft Word report. You will be asked to write a 5-page (2,500 words minimum) business report outlining your strategies to increase their presence online and to improve their online advertising and create the ability to sell books to people around the world. Grading Rubric Category | Points | Description | Criteria/Creativity | 75 | Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem. Be sure to include the basic concepts and criteria required by the owners of the bookstore. The final report should include a detailed matrix, comparing the various e-payment systems. Your idea must be detailed, compelling, and creative. | Understanding | 25 | Be sure to include all the elements required when creating your e-payment report. Be sure to listen carefully to the You Decide audio, so that you answer the questions Joe and Mary have in detail. | Execution | 25 | Make sure your report is clear and succinct, using...

Words: 942 - Pages: 4

Premium Essay

Risk Assesment

...GENERAL SIR JOHN KOTELAWALA DEFENCE UNIVERSITY CLASS ASSIGNMENT SUBJECT: INFORMATION TECHNOLOGY POLICY & PLANNING (MEG 3123) Prepared by Name | Number | | | MBA IN E-GOVERNANCE Programme 111 Year 2 Semester III Report Submission Date : 15 October 2015 Lecturer: Lt Col (Retd) Athula Samarasinghe Student declaration: | I declare that: | * I understand what is meant by plagiarism * The implications of plagiarism have been explained to me by our institution * This assignment is all my own work and I have acknowledged any use of the published or unpublished works of other people. | Student's signature: | Date: | Total number of pages including this cover page | | Submission Date | | Due Date | -10-2015 | Lecturer's Name | Lt Col (Retd) Athula Samarasinghe | OFFICIAL USE ONLY MARKER’S COMMENTS | Marker’s Name | Marks Awarded (100%) | Analysis of Topshoes Company Introduction This is an analysis of make-believe company called “topshoes”, with aim of drafting/imposing IT policies in each area where IT has been used. This hypothetical “topshoe” brand focuses on all age groups of the company. Products of this company maintain high demand in the local market as well as foreign markets. The company is very much concerns with the quality of the products and cost effective ways of manufacturing by using cutting edge technology as well as appropriate IT applications witch effects both quality and cost...

Words: 1771 - Pages: 8

Premium Essay

Ethical Issues in Information Systems

...Ethical Issues in Information System Sebron Fleming Strayer University CIS109 – Introduction to Management Information Systems November 22, 2015 Professor Jean-Robert Bokino Abstract Most would agree that the advancement of computer technology has greatly enhanced the lives of many in today's society; however, with these advancements some pitfalls have come into play that diminish these advancements. The greatest threat to the achievements that have been made is that the criminal element has found ways to intrude. One of the manners into which these intrusions have occurred is the criminal invasion of privacy and an attempt to attack the individual's identity. In many cases, these cyber attacks by criminals has caused a lose of consumer confidence and has forced internet users and consumers to carefully consider ways in which to protect themselves. The advancement of computer technology has allowed us to more easily and quickly accomplish those task that was at one time time consuming and both routine and exhaustive. We are now enabled to shop online via e-commerce and are afforded the ability to pay bills and even do our banking and pay taxes online. “New computer technologies for gathering, storing, manipulating, and communicating data are revolutionizing the use and spread of information. Along the way, they are also creating ethical dilemmas...forcing people to confront entirely new rights and responsibilities in their use of information and to reconsider standards...

Words: 1065 - Pages: 5

Premium Essay

Media

...way to do it in the traditional system. However, instead of printing out the data on paper in tradition, the system has to build an electronic file or database to store those data. In the case of companies who already use computer to issue their documents like purchase orders, they may already have some sort of databases which store those information, then they fan start with the next step described below. 2. Outbound translation The next step is to translate the electronic file or database in to a standard format according to the specification of the corresponding document. The resulting data file should contain a series of structured transactions related to the purchase order for example. If more than one company is involved in the particular transaction, individual files should be produced for each of them. 3. Communication Then the computer should connect and transmit those data files to the pre arranged Value Added Network [VAN} automatically. The VAN should then process each file and route the appropriate electronic mailboxes according to the destination set in the file. 4. Inbound translation The designated company should be able to retrieve the file from their electronic mailboxes in a constant period, and then reverse the process by translating the file from the standard format into the specific format required by the company’s application software. 5. Processing the electronic documents The internal application system of the designated company can...

Words: 2269 - Pages: 10

Premium Essay

Business Ethics

...research. Answer: Responses will vary, but should include references to shopping carts. Since cookies contain text data, they can help with the statelessness of the Internet. 2. In about 100 words, describe steganography and explain its connection to the topic of online security. You can use the links in the Online Companion to help with your research. Answer: Responses will vary, but should mention that this involves hiding information within another piece of information. 3. In about 200 words, explain the differences between public-key encryption and private-key encryption. List advantages and disadvantages of each encryption method. Explain which method you would use for e-mail sent from a field sales office to corporate headquarters. Assume that the e-mail regularly includes highly confidential information about upcoming sales opportunities. Answer: Responses will vary but should mention that public-key encryption, encodes messages by using two mathematically related numeric keys. Private-key encryption, encodes a message with one of several available algorithms that use a single numeric key, such as 456839420783, to encode and decode data. 4. In about 300 words, describe the security threats that a company could face if it implements a wireless network. Assume that the company occupies the six middle floors in a 12-story office building that is located in a downtown business area between two other buildings of similar height. Briefly...

Words: 1430 - Pages: 6

Premium Essay

Online Sales System (Dell)

...1.0 Introduction The report is aimed to investigate and identify the key element and the information system activities of the online sales system of Dell. In this system, customers are allowed to purchase electronic devices directly through the internet. First of all, let take a look on the some brief description about the company background and the system. 1.1 Company Background Dell Inc. is a world class e-commerce company that manufactures, sells, repairs and supports computers hardware and other related software and services. Dell does not own any direct stores instead the company is selling its products via online and other dealers or retailers like Wal-Mart and Best Buy. [1] Although the main business operation of Dell is in Round Rock, Texas, United State they have expanded to all the other places around the world with sizable manufacturing facilities in Austin, Texas; Limerick, Ireland; and Penang, Malaysia The founder of the company is Michael S. Dell. In 1 February 1984, Michael Dell founded a company called PC Limited with $1000 in his dorm. At that moment, he was a 19 years-old university student. [2] The company was selling IBM PC-compatible computers that equipped with stock components from various suppliers such as the processor from Intel. After he obtained $300,000 expansion capital from his family, he left the university to work full-time for his newly started business. He is the one who come out with the idea that sell directly to the consumer...

Words: 6368 - Pages: 26

Premium Essay

Computing

...exclusive HANDMADE KHUSSA's designed by Hina Fatima and Zara Fatima for girls/ladies (a sole business proprietor). Customized Khussas & Matching Clutches are also available. The business was started with a very low initial capital but within a few years due to the excellent quality of their products the demand grew enormously and now they hold business in several exhibitions and operate online globally too. Statement of problem (Maham Fatima) Older Method Used In the past the business used the manual system of record keeping. The shopkeeper was responsible for making these sales records. He had been provided with entry registers (journals), where he records and maintained the daily sale structures and transactions. The shopkeeper each time makes an entry on his book whenever a transaction is carried out, there is a change in the stock level or a receipt for a certain customer is being made.   The journals were divided into separate sections for receipts, payments, wages and superannuation, bank reconciliation, inventory and others. He recorded the business transactions manually in the appropriate sections for each month.  All transactions were recorded in one of these journals. It recorded the flow of income and expenses and was practical for a small business just starting out.  The cash disbursements journal records the money business spends. It had columns for various categories of expenditures with a line for each expenditure, including date, check number, payee...

Words: 4251 - Pages: 18

Premium Essay

Thesisss

...application .It also the best solution for providing information and a way of communications in every individual and gives better understanding of some event s that can arouse the interest of some particular subject matter. The computerized world is a highly efficient one, which processing the big quantities of data and keeping .The extensive records will not be a problem to a post industrialized society, likewise the unreliable and slow processing and preparing student record and enrollment summary of report. At Mabitac National High School (MNHS) Mabitac, Laguna there are five hundred three students taking several year levels. The populations of the student in mentioned School are continued to grow which means also that an increase of records are handled by the Guidance Councilor. Clearly the manual system of enrollment and student record keeping are too much time consuming task. Computer can be considered as another instrument for developing a system like enrollment in every school. This can be a great help to those students, teachers and school who are handling many task from providing easier and faster access. The Problem and its Background Computer as part of the innovation in technology manifests bigger changes in world, economies, banks and other manufacturing centers flourished due to the catching power of computers in the field of education, not all school can afford to have numbers of computer to update the...

Words: 3539 - Pages: 15

Premium Essay

Sanitation in Ghana

...on WEDNESDAY, 19TH NOVEMBER 2014 by SETH E. TERKPER Minister for Finance on the Authority of HIS EXCELLENCY PRESIDENT JOHN DRAMANI MAHAMA Theme: “Transformational Agenda: Securing the Bright Medium Term Prospects of the Economy ’’ THE 2015 BUDGET STATEMENT AND ECONOMIC POLICY ~ ii ~ Theme: “Transformational Agenda: Securing the Bright Medium Term Prospects of the Economy ’’ For copies of the Statement, please contact the Public Relations Office of the Ministry: Ministry of Finance Public Relations Office New Building, Ground Floor, Room 001/003 P. O. Box MB 40 Accra – Ghana The 2015 Budget Statement and Economic Policy of the Government of Ghana is also available on the internet at: www.mofep.gov.gh ~ iii ~ Theme: “Transformational Agenda: Securing the Bright Medium Term Prospects of the Economy ’’ ACRONYMS AND ABBREVIATIONS ABFA ACLP ADR AFCON AfDB AIDS AML AMSECs APR ATMA AVIC BACs BDS BIEPC BoG BOP bopd bps BR BRICS BSPs BVDs Annual Budget Funding Amount Ascertainment and Codification of Customary Law Project Alternative Dispute Resolution African Cup of Nations African Development Bank Acquired Immune Deficiency Syndrome Anti-Money laundering Agricultural Mechanization Services Enterprise Centres Annual Progress Report Accra-Tema Metropolitan Area Accra Visitor Information Centre Business Advisory Centres Business Development Services Bawku Inter Ethnic Peace Committee Bank of Ghana Balance of Payments barrels of oil per day basis points Benchmark...

Words: 63016 - Pages: 253

Free Essay

Information Tech

...CARIBBEAN EXAMINATIONS COUNCIL Caribbean Secondary Education Certificate CSEC ® INFORMATION TECHNOLOGY SYLLABUS Effective for examinations from May/June 2010 C XC 30/G /S YLL 08 1 Published by the Caribbean Examinations Council All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means electronic, photocopying, recording or otherwise without prior permission of the author or publisher. Correspondence related to the syllabus should be addressed to: The Pro-Registrar Caribbean Examinations Council Caenwood Centre 37 Arnold Road, Kingston 5, Jamaica, W.I. Telephone: (876) 630-5200 Facsimile Number: (876) 967-4972 E-mail address: cxcwzo@cxc.org Website: www.cxc.org Copyright © 2008, by Caribbean Examinations Council The Garrison, St Michael BB14038, Barbados CXC 30/G/SYLL 08 Contents RATIONALE .............................................................................................................................................. AIMS ...................................................................................................................................................... 1 2 2 2 3 4 5 5 7 7 8 10 12 13 15 16 19 21 23 46 47 ORGANIZATION OF THE SYLLABUS .................................................................................................. SUGGESTED TIME-TABLE ALLOCATION .......................................................................................... FORMAT...

Words: 16882 - Pages: 68

Premium Essay

Essentials of Management Information Systems

...Securing Information Systems LEARNING OBJECTIVES C H A P T E R 7 STUDENT LEARNING OBJECTIVES After completing this chapter, you will be able to answer the following questions: 1. Why are information systems vulnerable to destruction, error, and abuse? What is the business value of security and control? What are the components of an organizational framework for security and control? What are the most important tools and technologies for safeguarding information resources? 2. 3. 4. ISBN 1-256-42913-9 232 Essentials of MIS, Ninth Edition, by Kenneth C. Laudon and Jane P. Laudon. Published by Prentice Hall. Copyright © 2011 by Pearson Education, Inc. C HAPTER O UTLINE Chapter-Opening Case: Boston Celtics Score Big Points Against Spyware 7.1 System Vulnerability and Abuse 7.2 Business Value of Security and Control 7.3 Establishing a Framework for Security and Control 7.4 Technologies and Tools for Protecting Information Resources 7.5 Hands-on MIS Projects Business Problem-Solving Case: Are We Ready for Cyberwarfare? BOSTON CELTICS SCORE BIG POINTS AGAINST SPYWARE While the Boston Celtics were fighting for a spot in the playoffs several years ago, another fierce battle was being waged by its information systems. Jay Wessel, the team’s vice president of technology, was trying to score points against computer spyware. Wessel and his IT staff manage about 100 laptops issued to coaches and scouts, and sales, marketing, and finance employees, and these...

Words: 21009 - Pages: 85

Premium Essay

The Information Security Challenges and Threats of Private Banks: Evidence from Bangladesh.

...Bangladesh. Submitted To: Abul Khayer Lecturer Department of International Business University of Dhaka Submitted By: Raju Ahmed (Id no. 5) Lima Nath (Id no. 19) Tanzin Ara (Id no. 26) Zuairiyah Mouli (Id no. 43) Syed Arman Ali (Id no. 57) Department of International Business (3rd Batch) University of Dhaka Letter of Transmittal 3rd november, 2013 Abul khayer Lecturer Department of International Business University of Dhaka Sir, This is to inform you that the report on “The information security challenges and threats of private Banks: evidence from Bangladesh” that you assigned us to prepare has been submitted already. We have tried our best to disscuss the findings. Hope our report will fulfill the purpose and encourage us to do further. We express our gratitude to you for your guidance and we hope that this report will fulfill your requirements. Any short of suggestion regarding this report will be greatly acknowledged and we will feel proud if our paper serves its purpose. Sincerely Yours, Raju Ahmed (Id no. 5) Lima Nath (Id no. 19) Tanzin Ara (Id no. 26) Zuairiyah Mouli (Id no. 43) Syed Arman Ali (Id no. 57) Department of International Business (3rd Batch) University of Dhaka Table of Contents Abstract 4 Executive summary 5 1. Introduction 6 2. Literature Review 7 3. Research Objectives 9 4. Methodology 10 5. Technical Product Used by Bank in Bangladesh 11 5. Findings...

Words: 5178 - Pages: 21

Premium Essay

Revenue Cycle

...INFS7004 Accounting Information Systems Lecture 4 Transaction Cycles: The Revenue Cycle 1 The Conceptual System The Revenue Cycle The revenue cycle is the set of activities in a business which brings about the exchange of goods or services with customers for cash. Most business transactions are conducted on a credit basis. Cash is received after goods are shipped to the customer. 2 Sales Order 1 Credit / Customer Service 2 REVENUE CYCLE (SUBSYSTEM) Cash Receipts/ Collections 6 Shipping 3 Billing/ Accounts Receivable 4/5 Journal Vouchers/Entries: How do we get them?  Billing Dept. prepares a journal voucher: Accounts Receivable Sales DR CR  Inventory Control Dept. prepares a journal voucher: Cost of Goods Sold Inventory DR CR  Cash Receipts Dept. prepares a journal voucher: Cash Accounts Receivable DR CR 4 Sales Order Procedures  Sales order procedures include the task involved in receiving and processing a customer order, filling the order and shipping products to the customer at the proper time, and correctly accounting for transaction. 5 Receive Order  At this point, sale process begins indicating the type and quantity of merchandise desired by customer.  It may or may not be a physical document  Orders may arrive by mail, by telephone, or from a field representative who visited the customer  After creating the sales order, a copy of it is placed in the customer open order file. 6 Check Credit  For...

Words: 2302 - Pages: 10

Premium Essay

Aa Afaff

...Preventing Data Security Breaches And Identity Thefts Information Technology Essay Current online marketing strategies deliver immense benefits to the modern global firm by way of better market reach, cheap and convenient transaction possessing, multiple online payment options and real time consumer data management. Marked benefits are commonly discernible in the area of internet based business-to-business or B2B, and business-to-consumer or B2C e-commerce models. These online commerce models rely on digital marketing for their success, which in turn in essentially a remarkable success of information technology and data management techniques. However, the growth of digital marketing is getting severely affected by the misuse of technology by criminals and unscrupulous persons in various ways. Such misuse of technology encompasses identity theft, data loss and other data security breaches. Increasing information security breaches and cases of identity theft in recent times threaten the marketing of products and services either online or offline like never before. This paper attempts to understand issues and outcomes of identity theft, data loss and security breaches on the present and future global marketing environment by examining several secondary sources of information. 2. What is identity theft? We can help you to write your essay! Professional essay writers Our writers can help get your essay back on track, take a look at our services to learn more about how we can...

Words: 3128 - Pages: 13

Premium Essay

Vl Bank

...commercial customers utilize a digital certificate multifactor authentication process to access wire transfers, cash management, deposit operations, and account management applications common to all business customers. The problem is that several customers have reported that new user accounts have been set up under their names without their authorization and these accounts are initiating. The main term used in risk analysis Digital certificate multifactor will be defined and will be covered along with risk mitigation . A discussion of acceptable and unacceptable risk and how to follow specific federal best practice standards for securing communications and preventing cybercrime , provide a cybercrime prevention strategy using National Institute of Standards and Technology (NIST) federal guidelines. Digital Certificate : The most common method for authentication E-commerce transaction is via the exchange of digital certificates. Its contain digital signature which is unique representation of the certification authority. The digital signature is a distinctive mark that cannot be replicated by another entity. When affixed to a digital certificate, the certificate authority's signature affirms that the registration and issuance process requirements have been satisfactorily met by the applicant, and that the identity of the certificate holder is valid as represented. Per example login to secure bank site involve in following steps: 1- Login: user name , password XXX PIN number 2- Security...

Words: 2557 - Pages: 11