140 likes | 265 Views
No Life without Second Wife ? Laptop (+ Access + e) Is the term “better half” still working?. Access eCommerce Security. Dr. Alamgir Hossain eLINK Project Co-ordinator Department of Computing University of Bradford UK. 6---------11. Access.
E N D
No Life without Second Wife? Laptop (+ Access + e) Is the term “better half” still working?
Access eCommerce Security Dr. AlamgirHossain eLINK Project Co-ordinator Department of Computing University of Bradford UK
6---------11 Access Digital World without ‘Access’ is similar to football match without ‘Football’ Living Costs at Britain is very high but -- 8MB Broadband + Unlimited landline call 20 Countries =£5 per month Bangladesh 8MB broadband only = 200000TK min = £2000 per month (source: IT Sheraton Hotel) Plan – 5 Years ?
What will improve? Reduce Costs (Product, Travelling, Living ….) Reduce Traffic Enhance Competition Enhance Education /Research Improve Quality of Life – carbon emission, paper, life Style Remote accessibility – from rural area - ehealth 7. Virtual meeting, chatting, education ….
Ecommerce My Experience TV: Store price £2700 VS Internet Price £1699 + Free delivery ----(2004) Laptop Store Price £445 VS Internet Price £289 + free delivery ---(2008) Airlines Tickets UK-Dhaka-Singapore (return) KeyTravel (University Agent): Price offered £1550 - £1860 ----(2008) Internet Price: £1056 2. How to Compare Prices? Compareprices.co.uk; Kelkoo.com; ebroker.com; lastminute.com
Can we do at least this one next 5 years? • Low costs Access • Free Lunch programme • Good Governance - Tender Submission • eHealth Programme - Rural population (75%) • Free Website Hosting for Exporters • Tourism, Garments, Fish, Tea, Human Resources • Virtual Resource for Education and Research • (irrc-bd.org) Short Term Plan should include
Long Term Vision & Scopes Modelling – Car, Architectural, Fashion Design …. etc. Simulation – Medicine, Chemical, Design Testing….etc Visualisation – eLearning, graphical presentation of real-world Animation & Games – party games, 888.com…… Third Party – Broker’s role (ebrooker.com) Online Help Service (foreign companies) Skype, MSN – meeting, chatting…etc Innovate Business Idea – through Free Lunch Programme
eCommerce Statistics • E-commerce volume is expected to rise more than 17% in 2008 and over 70% in the next five years. (IBM-sponsored Retail Systems Research study- April 2008). • Europeansbankingthrough Internet: 54 millions in 2002, 103 millions in 2007 (Source: JupiterResearch ) • US Online buying will reach US$15 trillion 2010 (Forrester Research) • In the UK, sales are up 36% on 2008 and generating over 4 billion pounds per month (Forrester Research) • Online shopping sales in the UK hit a new high last year, hitting the £4bn per month mark in July for the first time and over a 12 month period online sales were up a massive 36% (Brand Republic). • Overall online shopping trends - Over 875 Million Consumers Have Shopped Online - the Number of Internet Shoppers Up 40% in Two Years. • Among Internet users, the highest percentage shopping online is found in: South Korea (99%) , UK (97%), Germany (97%) , Japan (97%) , US (94%) • The most popular and purchased items are: Books (41%), clothing/Accessories/Shoes (36%), Videos / DVDs / Games (24%), Airline Tickets (24%), Electronic Equipment (23%) • The bulk of e-commerce is conducted as business-to-business (B2B) e-commerce. According to the U.S. Census Bureau E-Stats report, B2B e-commerce totaled $2,716 billion representing 93% of online sales in 2007. Most of the remaining 7% was in the form of business-to-consumer (B2C) e-commerce. In 2007, B2C e-tail (electronic retail) sales totaled $107 billion dollars. In 2008, B2C e-tail sales totaled just over $127.7 billion or 3.2% of total retail sales.
Security Security breaches cost US$1 trillion last year (2008), according to a McAfee survey What are the advantages the attacker takes out of that? To gain money by stealing sensitive information of credit cards and bank accounts Revenge is another reason; because of bad behave against employees or unfair layoff, hackers try to hack in order to damage systems or stop services Some hackers take it as fun and challenging to themselves Hacking could be used for monitoring suspicious people. http://www.usatoday.com/tech/news/2001-05-31-revenge-hacking.htm
Possible Attacks • Social Engineering – Phishing, Vishing, Smishing, Shoulder Surfing, Social Relationship etc. • Beware – regarding new relationship ? • Do not give your password anyone – even …..except God • Traditional other attacks: Virus, Worm, Trojan Horse, Rootkit, Key Loggers, Packet Sniffer, Vulnerability scanner, Spoofing attack
“QurbanirGurur Hat” – ? Cattle market for 3-5 days before biggest festival Volume: 400000-500000 X 40000 TK (average price) = ???? “QurbanirGurur Hat” – ? For children – could be
Thank You For slides and further details: www.elink-edu.eu For Virtual Resource and Research: www.irrc-bd.org