from webinar series about E-COMMERCE SECURITY


Security is one of the most important aspects of an e-commerce business. For an online store, being able to gain a customer’s trust should be top priority. If you are unable to protect your customers’ personal data and credit card information then you can forget about doing business online. Your job is to provide safe web browsing and secure transactions. 

In order to provide your customers with the safest possible online shopping experience, there are three main security features that your e-commerce site cannot be without. They are secure hosting, SSL encryption and PCI compliance. With these three working in sync, your online store will have heavy duty protection, which will enable customers to have full confidence in making purchases.

The first thing you need is secure and reliable hosting without it, your e-commerce website will not be able to run smoothly. It’s important to have plenty of bandwidth to handle potential floods of traffic. Large disk space to store unlimited products and customer information. A strong firewall to protect important data, and the host provider must guarantee an uptime that is as close to 100% as possible.

SSL encryption provides security over networks. It’s basically a system that codes and decodes sensitive data such as a customer’s personal information or online transactions to protect it against hackers. E-commerce solutions typically provide 128 bit encryption which is already very secure, but some offer 256 bit for added protection.

PCI compliance is a standard which was created by major players in the credit card industry in 2006. It ensures that all online businesses that process store and transfer credit card information do so in a secure environment. In order to become PCI compliant, you must be able to build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy.

What you need is an e-commerce solution that offers daily backups, has close to a 99.9% uptime, provides state of the art firewall protection, has a data center with great backup generators, offers real-time protection monitoring, uses either 128 or 256 bit SSL encryption and is fully PCI compliant. 

Core Commerce provides customers with e-commerce security that can’t be beat. It even uses 256 bit encryption which is the highest in the industry. With design tools to set up your store in minutes, a full list of growing features at your disposal and superior support, it’s no wonder they are rated one of the best e-commerce solutions. Try it absolutely free for 15 days without giving them your credit card information.


Equally accessible to lawyers and computer security professionals alike, The Computer Law and Security Report regularly covers: Data protection and privacy Data and software protection European community developments in IT, IP and telecoms law IT contracts Telecommunications law and online liability Internet law and security policy Electronic commerce Internet fraud and misuse Systems security and risk management The Forum includes more than 80 specialists in computer law and security – between them specializing in every aspect of computer and communications law – spotting trends, highlighting practical concerns, monitoring new problems, and outlining key developments. Each issue contains well-researched reliable and thought provoking articles, case studies, detailed features and news reports – ensuring that you do not miss out on the impact of legislation worldwide and that you understand the problems of managing the legal and security requirements of computer use. Special Features Contact details of authors and features. Web site references for further information including document access guidance on where to obtain further information. Detailed appendices after articles Header summaries on each feature for easy scanning Product and people news Regular IT case law analysis and recent legislation Clear and easy to read Worldwide panel of expert correspondents Thorough index of each volume Compsec 2000 * the 17th World Conference on Computer Security, Audit & Control * will take place 1-3 November 2000 in Westminster, London, UK. Share the latest thinking and practice in all aspects of computer security with internationally renowned invited speakers, debates, workshops, case studies and a conference exhibition. 


Software copyright is the extension of copyright law to machine-readable software. While many of the legal principles and policy debates concerning software copyright have close parallels in other domains of copyright law, there are a number of distinctive issues that arise with software. This article will primarily focus on topics peculiar to software.

Software copyright is used by proprietary software companies to prevent the unauthorized copying of their software. Open source licenses also rely on copyright law to enforce their terms. For instance, copyleft licenses impose a duty on licensees to share their modifications to the copylefted work under some circumstances. No such duty would apply had the software in question been in the public domain.


EULAs and rights of end users

The Copyright Act expressly permits copies of a work to be made in some circumstances, even without the authorization of the copyright holder. In particular, “owners of copies” may make additional copies for archival purposes, “as an essential step in the utilization of the computer program”, or for maintenance purposes. Furthermore, “owners of copies” have the right to resell their copies, under the first sale doctrine and 17 U.S.C. § 109.

These rights only apply to “owners of copies.” Most software vendors claim that their products are “licensed, not sold”, thus sidestepping 17 U.S.C. § 117. American courts have taken varying approaches when confronted with these software license agreements. In MAI Systems Corp. v. Peak Computer, Inc.Triad Systems Corp. v. Southeastern Express Co., and Microsoft v Harmony, various Federal courts held that “licensed, not sold” language in an EULA was effective. Other courts have held that “no bright-line rule distinguishes mere licenses from sales…The label placed on a transaction is not determinative”. The Ninth Circuit took a similar view (in the specialized context of bankruptcy) in Microsoft Corp. v. DAK Industries, Inc.


Fair use

Fair use is a defense to an allegation of copyright infringement under section 107 of the Copyright Act of 1976. This section describes some of the uses of copyrighted software that courts have held to be fair. In Galoob v. Nintendo, the 9th Circuit held that modification of copyright software for personal use was fair. In Sega v. Accolade, the 9th Circuit held that making copies in the course of reverse engineering is a fair use, when it is the only way to get access to the “ideas and functional elements” in the copyrighted code, and when “there is a legitimate reason for seeking such access”.



Main article: Copyleft

A copyleft is a type of copyright license that allows redistributing the work (with or without changes) on condition that recipients are also granted these rights.


International Privacy Laws

The following list contains a number of international privacy related laws by country and region. Wherever possible, these hyperlinks reference an English translation of the law. See also our list of U.S. Privacy Laws and other information security policy resources.

(Datenschutzgesetz 2000 or DSG 2000).




Posted in Uncategorized | Leave a comment

Porter’s Five Forces Model and Blue Ocean Strategy (Kim & Mauborgne)

Porter’s five forces analysis is a framework for industry analysis and business strategy development formed by Michael E. Porter of Harvard Business School in 1979. It draws upon industrial organization (IO) economics to derive five forces that determine the competitive intensity and therefore attractiveness of amarket. Attractiveness in this context refers to the overall industry profitability. An “unattractive” industry is one in which the combination of these five forces acts to drive down overall profitability. A very unattractive industry would be one approaching “pure competition”, in which available profits for all firms are driven tonormal profit.

Three of Porter’s five forces refer to competition from external sources. The remainder are internal threats.

Porter referred to these forces as the micro environment, to contrast it with the more general term macro environment. They consist of those forces close to a company that affect its ability to serve its customers and make a profit. A change in any of the forces normally requires a business unit to re-assess themarketplace given the overall change in industry information. The overall industry attractiveness does not imply that every firm in the industry will return the same profitability. Firms are able to apply their core competencies, business model or network to achieve a profit above the industry average. A clear example of this is the airline industry. As an industry, profitability is low and yet individual companies, by applying unique business models, have been able to make a return in excess of the industry average.

Porter’s five forces is based on the Structure-Conduct-Performance paradigm in industrial organizational economics. It has been applied to a diverse range of problems, from helping businesses become more profitable to helping governments stabilize industries.



While Kim and Mauborgne propose approaches to finding uncontested market space, at the present there are few success stories of companies that applied their theories in advance. One success story that does exist is Nintendo, who first applied the Blue Ocean Strategy to create the Nintendo DS handheld game system which was the first portable gaming system to offer dual screen gaming and a touch screen. In 2006 Nintendo released Wii, which redefined who video games are played by. The 3DS is Nintendo’s third endeavour for its blue ocean strategy. Its first two attempts, the Nintendo DS and Wii, were wildly successful, becoming some of the biggest selling platforms in history. Nintendo revealed their Blue Ocean Strategy during an E3 press conference during the hype build-up of the Wii.

However with just one case study, this hole in their data persists despite the publication of Value Innovation concepts since 1997. Hence, a critical question is whether this book and its related ideas are descriptive rather than prescriptive.[8] The authors present many examples of successful innovations, and then explain from their Blue Ocean perspective – essentially interpreting success through their lenses.[9]

The research process followed by the authors has been criticized[10] on several grounds. Criticisms include claims that no control group was used, that there is no way to know how many companies using a Blue Ocean Strategy failed and the theory is thus unfalsifiable, that a deductive process was not followed, and that the examples in the book were selected to “tell a winning story.”[citation needed]

Brand and communication are taken for granted and do not represent a key for success. Kim and Maubourgne take the marketing of a value innovation as a given, assuming the marketing success will come as a matter of course.[8]

It is argued that rather than a theory, Blue Ocean Strategy is an extremely successful attempt to brand a set of already existing concepts and frameworks with a highly “sticky” idea.[11] The blue ocean/red ocean analogy is a powerful and memorable metaphor, which is responsible for its popularity. This metaphor can be powerful enough to stimulate people to action. However, the concepts behind the Blue Ocean Strategy (such as the competing factors, the consumer cycle, non-customers, etc.) are not new. Many of these tools are also used by Six Sigma practitioners and proposed by other management theorists.

Kim and Mauborgne argue that while traditional competition-based strategies (red ocean strategies) are necessary, they are not sufficient to sustain high performance. Companies need to go beyond competing. To seize new profit and growth opportunities they also need to create blue oceans.[5]

The authors argue that competition based strategies assume that an industry’s structural conditions are given and that firms are forced to compete within them, an assumption based on what academics call the structuralist view, or environmental determinism.[6] To sustain them in the marketplace, practitioners of red ocean strategy focus on building advantages over the competition, usually by assessing what competitors do and striving to do it better. Here, grabbing a bigger share of the market is seen as a zero-sum game in which one company’s gain is achieved at another company’s loss. Hence, competition, the supply side of the equation, becomes the defining variable of strategy. Here, cost and value are seen as trade-offs and a firm chooses a distinctive cost or differentiation position. Because the total profit level of the industry is also determined exogenously by structural factors, firms principally seek to capture and redistribute wealth instead of creating wealth. They focus on dividing up the red ocean, where growth is increasingly limited.[citation needed]

Blue ocean strategy, on the other hand, is based on the view that market boundaries and industry structure are not given and can be reconstructed by the actions and beliefs of industry players. This is what the authors call “reconstructionist view”. Assuming that structure and market boundaries exist only in managers’ minds, practitioners who hold this view do not let existing market structures limit their thinking. To them, extra demand is out there, largely untapped. The crux of the problem is how to create it. This, in turn, requires a shift of attention from supply to demand, from a focus on competing to a focus on value innovation – that is, the creation of innovative value to unlock new demand. This is achieved via the simultaneous pursuit of differentiation and low-cost. As market structure is changed by breaking the value/cost tradeoff, so are the rules of the game. Competition in the old game is therefore rendered irrelevant. By expanding the demand side of the economy new wealth is created. Such a strategy therefore allows firms to largely play a non–zero-sum game, with high payoff possibilities.[7]



^ Kim and Mauborgne. Blue Ocean Strategy. Harvard Business School Press. 2005.

a b “A conversation with W.Chan Kim and Renee Mauborgne”. INSEAD. 2005. Retrieved 2008-12-31.



Posted in Uncategorized | Leave a comment

The Facebook Era by Clara Shih REACTION

Based on the webinar “The Facebook Era” by Clara Shih, today’s technology has changed electronic commerce because we have now a lot of social networking services like Facebook, Twitter, Tumbler, Multiply and etc. that makes the marketers easily to access our personal data, information and profiles which includes the Identity, photos, interests, demographic information, employer, school, city, friends and any other information of the user. It is a big help for the marketers to easily find or locate where to find their potential customer or client on by just clicking. Well obviously today the people who are in these social networking services are increasing, almost everybody, everyone or all individuals have an account in a social networking services said from above. And the highly regarded as a prime catalyst in electronic commerce and Internet marketing is the FACEBOOK.

What is facebook? Facebook is a social networking service and website launched in February 2004, operated and privately owned by Facebook Inc. As of February 2012, Facebook has more than 845 million active users.Users must register before using the site, after which they may create a personal profile, add other users as friends, and exchange messages, including automatic notifications when they update their profile. Additionally, users may join common-interest user groups, organized by workplace, school or college, or other characteristics, and categorize their friends into lists such as “People From Work” or “Close Friends”. The name of the service stems from the colloquial name for the book given to students at the start of the academic year by some university administrations in the United States to help students get to know each other. Facebook allows any users who declare themselves to be at least 13 years old to become registered users of the site.

Facebook was founded by Mark Zuckerberg with his college roommates and fellow students Eduardo Saverin,Dustin Moskovitz and Chris Hughes. The Web site’s membership was initially limited by the founders toHarvard students, but was expanded to other colleges in the Boston area, the Ivy League, and Stanford University. It gradually added support for students at various other universities before opening to high school students, and eventually to anyone aged 13 and over. However, according to a May 2011 Consumer Reportssurvey, there are 7.5 million children under 13 with accounts and 5 million under 10, violating the site’s terms of service.

A January 2009 Compete.com study ranked Facebook as the most used social networking service by worldwide monthly active users. Entertainment Weekly included the site on its end-of-the-decade “best-of” list, saying, “How on earth did we stalk our exes, remember our co-workers’ birthdays, bug our friends, and play a rousing game of Scrabulous before Facebook?” Quantcast estimates Facebook has 138.9 million monthly unique U.S. visitors in May 2011. According to Social Media Today, in April 2010 an estimated 41.6% of the U.S. population had a Facebook account. Nevertheless, Facebook’s market growth started to stall in some regions, with the site losing 7 million active users in the United States and Canada in May 2011. Facebook filed for an initial public offering on February 1, 2012.

Users can create profiles with photos, lists of personal interests, contact information, and other personal information. Users can communicate with friends and other users through private or public messages and a chat feature. They can also create and join interest groups and “like pages” (called “fan pages” until April 19, 2010), some of which are maintained by organizations as a means of advertising. A 2012 Pew Internet and American Life study identified that between 20-30% of Facebook users are “power users” who frequently link, poke, post and tag themselves and others.

One of the most popular applications on Facebook is the Photos application, where users can upload albums and photos. Facebook allows users to upload an unlimited number of photos, compared with other image hosting services such as Photobucket and Flickr, which apply limits to the number of photos that a user is allowed to upload. During the first years, Facebook users were limited to 60 photos per album. As of May 2009, this limit has been increased to 200 photos per album.

According to comScore, an internet marketing research company, Facebook collects as much data from its visitors as Google and Microsoft, but considerably less than Yahoo!.In 2010, the security team began expanding its efforts to reduce the risks to users’ privacy, but privacy concerns remain. On November 6, 2007, Facebook launched Facebook Beacon, which was an ultimately failed attempt to advertise to friends of users using the knowledge of what purchases friends made. As of March 2012, Facebook’s usage of its user data is under close scrutiny.

According to comScore, Facebook is the leading social networking site based on monthly unique visitors, having overtaken main competitor MySpace in April 2008. ComScore reports that Facebook attracted 130 million unique visitors in May 2010, an increase of 8.6 million people. According to Alexa, the Web site’s ranking among all Web sites increased from 60th to 7th in worldwide traffic, from September 2006 to September 2007, and is currently 2nd. Quantcastranks the Web site 2nd in the U.S. in traffic,and Compete.com ranks it 2nd in the U.S. The Web site is the most popular for uploading photos, with 50 billion uploaded cumulatively.In 2010, Sophos’s “Security Threat Report 2010” polled over 500 firms, 60% of which responded that they believed that Facebook was the social network that posed the biggest threat to security, well ahead of MySpace, Twitter, and LinkedIn.

Facebook is the most popular social networking site in several English-speaking countries, including Canada,the United Kingdom, and the United States.In regional Internet markets, Facebook penetration is highest in North America (69 percent), followed by Middle East-Africa (67 percent), Latin America (58 percent), Europe (57 percent), and Asia-Pacific (17 percent).

In January 2012 the countries with the most Facebook users were:

  • United States with 152.5 million members,
  • India with 43.5 million members
  • Indonesia with 43.1 million members
  • Brazil with 37.9 million members
  • Mexico with 32.0 million members 

All of the above total 309 million members or about 38.6 percent of 800 million Facebook’s worldwide members.

In April 2011, Facebook launched a new portal for marketers and creative agencies to help them develop brand promotions on Facebook. The company began its push by inviting a select group of British advertising leaders to meet Facebook’s top executives at an “influencers’ summit” in February 2010. Facebook has now been involved in campaigns for True Blood, American Idol, and  News and media outlets such as the Washington Post, Financial Times and ABC News have used aggregated Facebook fan data to create various infographics and charts to accompany their articles.

Facebook has affected the social life and activity of people in various ways. With its availability on many mobile devices, Facebook allows users to continuously stay in touch with friends, relatives and other acquaintances wherever they are in the world, as long as there is access to the Internet. It can also unite people with common interests and/or beliefs through groups and other pages, and has been known to reunite lost family members and friends because of the widespread reach of its network. One such reunion was between John Watson and the daughter he had been seeking for 20 years. They met after Watson found her Facebook profile. Another father-daughter reunion was between Tony Macnauton and Frances Simpson, who had not seen each other for nearly 48 years.

Some argue that Facebook is beneficial to one’s social life because they can continuously stay in contact with their friends and relatives



*  http://en.wikipedia.org/wiki/Facebook 

*  ^ a b Eldon, Eric (December 18, 2008). “2008 Growth Puts Facebook In Better Position to

      Make Money”. VentureBeat (San Francisco). Retrieved December 19, 2008.

*^ Protalinski, Emil (February 1, 2012). “Facebook has over 845 million users”. ZDNet. Retrieved February 4, 2012.


So in marketing, involving and using Facebook in business really helps them through their CRM Customers Relationship Management, to enable for the marketers to manage Contacts and Relationships to their to the people.

Posted in Uncategorized | 3 Comments

Hello world!

Welcome to WordPress.com. After you read this, you should delete and write your own post, with a new title above. Or hit Add New on the left (of the admin dashboard) to start a fresh post.

Here are some suggestions for your first post.

  1. You can find new ideas for what to blog about by reading the Daily Post.
  2. Add PressThis to your browser. It creates a new blog post for you about any interesting  page you read on the web.
  3. Make some changes to this page, and then hit preview on the right. You can always preview any post or edit it before you share it to the world.
Posted in Uncategorized | 1 Comment