This site uses cookies to deliver our services and to show you relevant ads and presentations. By clicking on "Accept", you acknowledge that you have read and understand our Cookie Policy , Privacy Policy , and our Terms of Use.

Download E-Commerce transactions And Shopping Cart PowerPoint Presentation

Login   OR  Register

Iframe embed code :

Presentation url :


Description :

Available E-Commerce transactions And Shopping Cart powerpoint presentation for free download which is uploaded by steve an active user in belonging ppt presentation Business & Management category.

Tags :

E-Commerce transactions And Shopping Cart

Home / Business & Management / Business & Management Presentations / E-Commerce transactions And Shopping Cart PowerPoint Presentation

E-Commerce transactions And Shopping Cart PowerPoint Presentation

Ppt Presentation Embed Code   Zoom Ppt Presentation

About This Presentation

Description : Available E-Commerce transactions And Shopping Cart powerpoint presentation for free download which ... Read More

Tags : E-Commerce transactions And Shopping Cart

Published on : Aug 07, 2014
Views : 561 | Downloads : 0

Download Now

Share on Social Media


PowerPoint is the world's most popular presentation software which can let you create professional E-Commerce transactions And Shopping Cart powerpoint presentation easily and in no time. This helps you give your presentation on E-Commerce transactions And Shopping Cart in a conference, a school lecture, a business proposal, in a webinar and business and professional representations.

The uploader spent his/her valuable time to create this E-Commerce transactions And Shopping Cart powerpoint presentation slides, to share his/her useful content with the world. This ppt presentation uploaded by worldwideweb in this Business & Management category is available for free download,and can be used according to your industries like finance, marketing, education, health and many more. provides a platform to marketers, presenters and educationists along with being the preferred search engine for professional PowerPoint presentations on the Internet to upload their E-Commerce transactions And Shopping Cart ppt presentation slides to help them BUILD THEIR CROWD!!

User Presentation
Related Presentation
Free PowerPoint Templates
Slide 1 - E- Commerce transactions And Shopping Cart ERDEM OZDEN INBS 510 ANNA STORY APRIL 16, 2002
Slide 2 - Online Credit Card Fraud Stats Global online purchases will reach $310 billion in 2005. Online credit card fraud will cost $9 billion in 2001. Widespread use of anti-fraud technology will reduce online payment fraud to $5.7 billion by 2005, from a potential $15.5 billion. Fraud was 19 times higher online, than with brick and mortar stores in 2001. Source: Meridien Research
Slide 3 - How Consumers View Authentication 47% are now comfortable with registering on web sites by providing personal information. 80% said they would be open to additional authentication measures to make online purchases more secure. 50% said they would be open to using a personal identification number (PIN). 32% said they would be willing to type in a portable password created by a credit card company. 42% said they are “annoyed” at having to remember different passwords for different sites. Source: Jupiter Media Metrix
Slide 4 - SHOPPING CYCLE Online Store: The merchant sets up an online store. Bank Account: The merchant registers with a bank to authorize transactions. Product Selection: Customers browse products by product category, or by text search. Shopping Cart: Customers view and change the contents of their shopping cart. Customer Registration: Registration is needed when customers make a purchase. Check Out: The customer may verify or change items, and then proceed with their purchase. Credit Card Authorization: The customer submits credit card information for authorization. Order Processing: After credit card authorization, the merchant sends the product.
Slide 5 - Online Credit Card Transaction Shopping Cart Calculate Totals Get User Info Enter Credit Card Information Enough Funds Card Refused Card Authorized E-mail Customer Failed E-mail Customer Yes No 1. Customer Proceeds to Check out. 2. Shipping, tax added for total amount. 3. Customer’s address, telephone information. 4. Customer’s credit card information. 5. If the CC is Authorized Process Order. 5. If the CC is Declined Get New CC.
Slide 6 - SHOPPING SERVICES One-click Buy : CC data is stored in database, and used for instant purchases. Personalization : Some merchants offer personalized services like special offers, and recommendations, for registered customers. Order Tracking : The customers monitor order status by using the order ID. Save your cart : Customers save their cart and complete the transaction at a later date. E-mail Verification : The customers receive emails about news, special events, recommendations, and the recent order.
Slide 7 - SHOPPING CARTS Keep the process simple. Include tax and shipping costs to display the exact charges. Tell customers how many steps are involved. Add gift option before the checkout. Put policy information in pop-up windows. Don’t force registration. Customers lose patience fast. Offer multiple shipping options. Limit the checkout process with five to six steps.
Slide 8 - Personalization Homepage Cookie? Yes No Retrieve Preferences Create Personal Page Database User Selects New Or Returning User User Selects New User User Selects Returning User User Enters User Information Cookie Set Return Homepage User Enters ID Password User Exists? Register Cookie Set Return Homepage Yes No Database
Slide 9 - CHARGE-BACK ACQUIRER BANK ISSUER BANK CARDHOLDER Merchant Account 1. Cardholder calls Issuer Bank for fraud. 2. Issuer Bank calls Acquirer Bank. 3. Acquirer Bank debits merchant account. Additional penalty, or cancels agreement. 4. Issuer Bank gives cardholder’s credit.
Slide 10 - FRAUD Lower consumer confidence. Higher cost of transactions and loss of revenue for merchants. Higher costs of services for financial institutions. Image damage to the credit card companies and issuers. “Charge-back fraud has slowed the growth of e-commerce…Nothing is going to happen until credit card companies can positively authenticate every consumer buying from a website.” Theodore Lacobuizo, Senior Analyst, TowerGroup
Slide 11 - SECURITY THREAT Employee Theft: Employee steals data. This is the largest threat. Trojan Horse: Can be used for snooping. Frequently used in a virus attack. Hacking : Breaking into a system. Trojan horses used for returning to server. Social Engineering: Hackers act like a network engineer. Buffer Overflow: Cause an overflow condition. May grant root access. Cracking: Breaking into system to steal things. Password Fishing: Trying to log in with common passwords. Snooping: Use of a software program to intercept data. Application Attack: Force application to fall-over, and root access to system.
Slide 12 - Secure Electronic Transaction (SET) Development of Visa and MasterCard. Certificate-based system. Digital signatures to replace the handwritten signatures. Cardholder software is required. Digital certificates are installed on consumer’s PC. Expensive. Complex structure. Because of its complexity, and cost, SET usage was limited.
Slide 13 - Secure Sockets Layer (SSL) Created by Netscape. Simple to implement. Implemented in Transport Layer (TLS). Supports most of the browsers and Web servers. Widely used in Web transactions. Uses digital certificates.
Slide 14 - Secure Sockets Layer (SSL) BROWSER SERVER 1. Browser sends SSL request massage. 2. Server responds by sending it’s certificate. 3. Browser verifies that the certificate is valid. 4. Browser sends one time session key. 5. Server decrypts the massage with it’s private key. 6. Source exchanges with symmetric encryption.
Slide 15 - The certificate, which contains the Web server’s public key, will be used by the browser to: Authenticate the identity of a Web site. Contain the Web server’s public key. Encrypt information for the server using SSL. Certification Authority (CA) Certificates CA Certificates are issued by a trusted third party called a Certification Authority (CA). CA validates the certificate holders’ identity. Web Server Certificates
Slide 16 - Visa Payer Authentication Service (VPAS) New payer authentication service from VISA. Based on a protocol known as 3-D Secure. Announced in 2001. “3-D” refers to the three domains Issuers Acquirers Transaction Communication
Slide 17 - How VPAS Works Cardholder Merchant Merchant Requests Authorization Card Association Directory Issuer Access Control Server 1. Cardholder selects ’buy’. 5. Merchant verifies signature, and sends authorization request. 3. Visa checks CAD for customer data. 4. Issuer ACS validates password, digitally signs response, transmits copy to Authentication History Server 2. Merchant queries Visa for account data.
Slide 18 - MasterCard Secure Payment Application (SPA) MasterCard’s security solution. It requires participation by the card issuer and the merchant. Cardholder has to download a wallet application from the issuer. Deployment of SPA will be through server-based electronic wallets. Wallet will automatically fill out payment information on the online order form. Includes a unique cardholder authentication value for each transaction. Scheduled to the second quarter of 2002.
Slide 19 - Address Verification Service (AVS) Designed for mail-order and telephone order environments. Checks first 4 numeric digits of address and zip code. Merchant receives response codes, detailing degree of match. AVS does not guarantee charge-back protection. Data used is not always current. Only used in U.S., U.K., Germany, Austria and Switzerland. May result in false rejection of valid orders.