+ 1-888-787-5890  
   + 1-302-351-4405  

Essay/Term paper: Electronic commerce

Essay, term paper, research paper:  Information Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: Electronic Commerce, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.

Electronic Commerce

Initially, the Internet was designed to be used by government and academic users,
but now it is rapidly becoming commercialized. It has on-line "shops", even
electronic "shopping malls". Customers, browsing at their computers, can view
products, read descriptions, and sometimes even try samples. What they lack is
the means to buy from their keyboard, on impulse. They could pay by credit card,
transmitting the necessary data by modem; but intercepting messages on the
Internet is trivially easy for a smart hacker, so sending a credit-card number
in an unscrambled message is inviting trouble. It would be relatively safe to
send a credit card number encrypted with a hard-to-break code. That would
require either a general adoption across the internet of standard encoding
protocols, or the making of prior arrangements between buyers and sellers. Both
consumers and merchants could see a windfall if these problems are solved. For
merchants, a secure and easily divisible supply of electronic money will
motivate more Internet surfers to become on-line shoppers. Electronic money
will also make it easier for smaller businesses to achieve a level of automation
already enjoyed by many large corporations whose Electronic Data Interchange
heritage means streams of electronic bits now flow instead of cash in back-end
financial processes. We need to resolve four key technology issues before
consumers and merchants anoint electric money with the same real and perceived
values as our tangible bills and coins. These four key areas are: Security,
Authentication, Anonymity, and Divisibility.

Commercial R&D departments and university labs are developing measures to
address security for both Internet and private-network transactions. The
venerable answer to securing sensitive information, like credit-card numbers, is
to encrypt the data before you send it out. MIT's Kerberos, which is named
after the three-headed watchdog of Greek mythology, is one of the best-known-
private-key encryption technologies. It creates an encrypted data packet,
called a ticket, which securely identifies the user. To make a purchase, you
generate the ticket during a series of coded messages you exchange with a
Kerberos server, which sits between your computer system and the one you are
communicating with. These latter two systems share a secret key with the
Kerberos server to protect information from prying eyes and to assure that your
data has not been altered during the transmission. But this technology has a
potentially weak link: Breach the server, and the watchdog rolls over and plays
dead. An alternative to private-key cryptography is a public-key system that
directly connects consumers and merchants. Businesses need two keys in public-
key encryption: one to encrypt, the other to decrypt the message. Everyone who
expects to receive a message publishes a key. To send digital cash to someone,
you look up the public key and use the algorithm to encrypt the payment. The
recipient then uses the private half of the key pair for decryption. Although
encryption fortifies our electronic transaction against thieves, there is a
cost: The processing overhead of encryption/decryption makes high-volume, low-
volume payments prohibitively expensive. Processing time for a reasonably safe
digital signature conspires against keeping costs per transaction low.
Depending on key length, an average machine can only sign between twenty and
fifty messages per second. Decryption is faster. One way to factor out the
overhead is to use a trustee organization, one that collects batches of small
transaction before passing them on to the credit-card organization for
processing. First Virtual, an Internet-based banking organization, relies on
this approach. Consumers register their credit cards with First Virtual over
the phone to eliminate security risks, and from then on, they uses personal
identification numbers (PINs) to make purchases.

Encryption may help make the electric money more secure, but we also need
guarantees that no one alters the data--most notably the denomination of the
currency--at either end of the transaction. One form of verification is secure
hash algorithms, which represent a large file of multiple megabytes with a
relatively short number consisting of a few hundred bits. We use the surrogate
file--whose smaller size saves computing time--to verify the integrity of a
larger block of data. Hash algorithms work similarly to the checksums used in
communications protocols: The sender adds up all the bytes in a data packet and
appends the sum to the packet. The recipient performs the same calculation and
compares the two sums to make sure everything arrived correctly. One possible
implementation of secure hash functions is in a zero-knowledge-proof system,
which relies on challenge/response protocols. The server poses a question, and
the system seeking access offers an answer. If the answer checks out, access is
granted.In practice, developers could incorporate the common knowledge into
software or a hardware encryption device, and the challenge could then consist
of a random-number string. The device might, for example, submit the number to a
secure hash function to generate the response.

The third component of the electronic-currency infrastructure is anonymity--the
ability to buy and sell as we please without threatening our fundamental freedom
of privacy. If unchecked, all our transactions, as well as analyses of our
spending habits, could eventually reside on the corporate databases of
individual companies or in central clearinghouses, like those that now track our
credit histories. Serial numbers offer the greatest opportunity for broadcasting
our spending habits to the outside world. Today's paper money floats so freely
throughout the economy that serial numbers reveal nothing about our spending
habits. But a company that mints an electric dollar could keep a database of
serial numbers that records who spent the currency and what the dollars
purchased. It is then important to build a degree of anonymity into electric
money. Blind signatures are one answer. Devised by a company named DigiCash,
it lets consumers scramble serial numbers. When a consumer makes an E-cash
withdrawal, the PC calculates the number of digital coins needed and generates
random serial numbers for the coins. The PC specifies a blinding factor, a
random number that it uses to multiply the coin serial numbers. A bank encodes
the blinded numbers using its own secret key and debits the consumer's account.
The bank then sends the authenticated coins back to the consumer, who removes
the blinding factor. The consumer can spend bank-validated coins, but the bank
itself has no record of how the coins were spent.

The fourth technical component in the evolution of electric money is flexibility.
Everything may work fine if transactions use nice round dollar amounts, but that
changes when a company sells information for a few cents or even fractions of
cents per page, a business model that's evolving on the Internet. Electric-money
systems must be able to handle high volume at a marginal cost per transaction.
Millicent, a division of Digital Equipment, may achieve this goal. Millicent
uses a variation on the digital-check model with decentralized validation at the
vendor's server. Millicent relies on third-party organizations that take care of
account management, billing, and other administrative duties. Millicent
transactions use scrip, digital money that is valid only for Millicent. Scrip
consists of a digital signature, a serial number, and a stated value (typically
a cent or less). To authenticate transactions, Millicent uses a variation of the
zero-knowledge-proof system. Consumers receive a secret code when they obtain a
scrip. This proves ownership of the currency when it's being spent. The vendor
that issues the scrip value uses a master-customer secret to verify the
consumer's secret. The system hasn't yet been launched commercially, but Digital
says internal tests of transactions across TCP/IP networks indicate the system
can validate approximately 1000 requests per second, with TCP connection
handling taking up most of the processing time. Digital sees the system as a way
for companies to charge for information that Internet users obtain from Web

Security, authentication, anonymity, and divisibility all have developers
working to produce the collective answers that may open the floodgates to
electronic commerce in the near future. The fact is that the electric-money
genie is already out of the bottle. The market will demand electric money
because of the accompanying new efficiencies that will shave costs in both
consumer and supplier transactions. Consumers everywhere will want the bounty of
a global marketplace, not one that's tied to bankers' hours. These efficiencies
will push developers to overcome today's technical hurdles, allowing bits to
replace paper as our most trusted medium of exchange.


Other sample model essays:

Information Technology / Employment Skills
Employment Skills By: Thiru Thirunavukarasu Introduction In my essay I will talk about the skills required to get a good job nowadays. There will be three main points I will be disc...
Information Technology / Escapism And Virtual Reality
Escapism and Virtual Reality ABSTRACT The use of computers in society provides obvious benefits and some drawbacks. `Virtual Reality', a new method of interacting with any computer, is p...
Information Technology / Essay On Hacking
Essay On Hacking by Philip Smith A topic that i know very well is computers and computer hacking. Computers seem very complicated and very hard to learn, but, if given time a com...
Information Technology / Ethics In Cyberspace
Ethics in Cyberspace Cyberspace is a global community of people using computers in networks. In order to function well, the virtual communities supported by the Internet depend upon rules ...
Computer Viruses: Infection Vectors, and Feasibility of Complete Protection A computer virus is a program which, after being loaded into a computer's memory, copies itself with the purpose ...
Information Technology / Fiber Optics
Fiber Optics Fiber Optic Cable Facts "A relatively new technology with vast potential importance, fiber optics is the channeled transmission of light through hair-thin glass fibers." [...
Information Technology / The First Generation Of Computers
The First Generation of Computers The first generation of computers, beginning around the end of World War 2, and continuing until around the year 1957, included computers that used va...
Get Informed! - Buying The Right Computer Buying the right computer can be complicating. Because of this many people are detoured from using or purchasing a very beneficial machine. Some ...
Information Technology / The Internet
The Internet Imagine a place where people interact in business situations, shop, play video games, do research, or study and get tutoring. Now imagine that there are no office buildings, ...
Government Intervention on the Internet CIS 302 - Information Systems I John J. Doe XXX-XX-XXXX March 12, 1997 During the last decade, our society has become ba...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
Browns Mills, New Jersey, United States
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per the rubric.
Browns Mills, New Jersey, United States
it is always perfect
Frederick, Maryland, United States
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663 is absolutely excellent. This writer provides the highest quality of work possible.
Browns Mills, New Jersey, United States
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD