The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's open market, e-commerce has developed its strategy to process various business applications. There applications are developed with the platforms like Magento, Zen Cart, Prestashop, Spree etc., to run a successful online store. These are also used for customer e-commerce apps and require a scalable database for storing the data. The NoSQL database provides an efficient storage access and...
This paper discussed about e-commerce application infrastructure that supported services to customer and increase the long-term company's profit while doing transaction using e-commerce. E-commerce is being an important aspect in business that changes the business model from traditional market to electronic market. Empowered by internet technology to connect and treat customer with satisfactory make...
In order to help E-commerce enterprises to build E-commerce cloud platform with cloud computing, this article mainly discussed about application of cloud computing in E-commerce. It analyzed the relevant technology of the cloud computing and put forward E-commerce application mode on the basis of cloud computing combining with the current present situation and advantages of the development of electronic...
In recent times the role of information technology in the business enterprises has emerged with new levels of services, storage requirements, resource management and availability. As the amount of data that is available now a days is too huge for a single organization to control and manage so here putting the data on cloud can act as a savior. In this paper the advantages, various service and deployment...
E-commerce applications are nowadays facilitating users to access resources spread at different places. It has increased the reach of people and has shortened the horizon. There can be many threats and attacks scenarios possible in the completion of an e-commerce application. So security must be intact at every step in this process. User authentication is very challenging aspect of e-commerce application...
With the advent of big data phenomenon in the world of data and its related technologies, the developments on the NoSQL databases are highly regarded. It has been claimed that these databases outperform their SQL counterparts. The aim of this study is to investigate the claim by evaluating the document-oriented MongoDB database with SQL in terms of the performance of common aggregated and non-aggregate...
The ongoing increase in the usage of web has led to accumulation of large amounts of data every second. This has in turn made the research industry to grow and focus towards employing web usage mining for increasing the revenues for businesses, carrying out analysis on browsing behavior of web users, improving website layout and much more. Web usage mining is becoming increasingly popular due to the...
E-commerce is gaining popularity day by day. Key attractions causing increased adoption of E-commerce are high availability, ubiquitous, reduced cost & time and efficiency. In today's changing world, technology is growing rapidly. One such growth can be cloud based solution for E-commerce. Software as a Service (SaaS) is one of the model of cloud computing. The proposed system is based on the...
A mobile agent is a program that is issued either by a human user or an application to travel over a network autonomously to either gather information or perform some computation. However its many benefits, mobile agent technology resulted in new significant security threats from both malicious agents and hosts. This paper introduces novel efficient and light security framework for mobile agent environment...
With the rapid development of e-commerce business, a more reliable and extensible database cluster architecture is needed in almost all e-commerce systems. For a distributed-system, Percona XtraDB Cluster provides consistency and availability. MySQL Replication provides availability and partitioning tolerance. In an e-commerce system, we need consistency, availability, partitioning tolerance in different...
With the rapid development of Internet and information technology, our daily lives are changing from time to time. Among these changes, on-line shopping brings a lot of convenience. How to make taxation system satisfy on-line commerce activities is a new challenge. This paper proposes an E-Invoice Framework, which aims at supporting data-oriented taxation systems which focuses more on direct tax-related...
E-commerce provides low transaction costs and more convenient business mode to all over world customers. We describe many asymmetric approaches which use in E-commerce transaction and other supported cryptography algorithms which are essential in working setup of E-commerce. In this paper, we propose a model of E-transaction based on PGP. It will show that how much secure payment and customer order...
Electronic banking (e-banking) is the next-generation banking that electronically delivers a wide range of banking services where the physical presence of the customer at the bank premises is not required. With the advent of Internet connectivity and a number of security tools of e-commerce, the penetration of e-banking is increasing most of the developing countries, e.g., Bangladesh. Although there...
Phishing is a type of electronic identity theft in which a combination of social engineering and website spoofing techniques is used to deceive a user into giving away confidential information with economic value. Phishing has flourished exponentially together with the expansion of the Internet. This flourish and the development of technology has not only benefitted Internet users, but also has enabled...
Traditional credit cards are not secured as the card numbers could be copied and repetitively used for unauthorized transactions. Credit card security is a major concern for any business establishment. With that in mind, it is hard to put the blame of credit card fraud on one entity versus another (card issuer, card holder, card processor, or funds collector) because all share the same risk. The answer...
Nowadays, World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world. Therefore E-commerce or electronic commerce is formed. E-commerce is any type of business or commercial transaction that involves the transfer of information across...
Traditional e-commerce transactions limited to producers through a third party and consumers, manufacturers rarely communicate directly with consumers. The system is adapted to this need. Virtual factory communication platform of producers and consumers are proposed. The paper presents the development of online virtual factory based on database and order design. The experiments show virtual operation...
E-commerce has made great strides in providing a convenient, fast and secure shopping experience for consumers. However, there is still a significant portion of shoppers whose security fears impact how they spend their money online. Because of this, security issues associated with ecommerce and customer sites must be constantly reviewed and updated with appropriate countermeasures. As web security...
This paper summarized applications of Fire Wall in e-Commerce security system and have set forth choice principle on fire wall; have studied e-Commerce network security technique on Fire Wall; analysed constructing e-Commerce network security technology and applied to actual e-Commerce system design on power.
With the massification of high speed Internet access, recent industry consumer reports show that Web site performance is increasingly becoming a key feature in determining user satisfaction, and finally, a decisive factor in whether a user will purchase on a Web site or even return to it. Traditional Web infrastructure capacity planning has focused on maintaining high throughput and availability on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.