Thursday, 31 January 2008
http://www.computerevidence.co.uk/Cases/CMA.htm
http://www.computerevidence.co.uk/Cases/CMA.htm
instances where the computer misuse act has been used
instances where the computer misuse act has been used
Wednesday, 30 January 2008
Information commissioners office
http://www.ico.gov.uk/Home/what_we_cover/data_protection/guidance/technical_guidance_notes.aspx good info about the data protection act
Friday, 25 January 2008
Mr H's Powerpoints
To access Mr H's Powerpoint files outside of school please go to :
http://gallery.mac.com/shsg
http://gallery.mac.com/shsg
Report structure for security task
What is E-Commerce?
Why is E- Commerce more susceptible to threats than normal commerce?
What information has the customer given to the website?
What are the threats to Data Security for E-Commerce?
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What are the preventative methods for these threats?
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Describe the legislation that the business should be aware of:
1.
2.
3.
4.
5.
How effective are these pieces of legislation?
1.
2.
3.
4.
5.
Overall conclusions:
Is data secure on this website – yes:
1.
2.
3.
Is data insecure on this website – no:
1.
2.
3.
Overall conclusion:
1.
2.
3.
Macintosh HD:Users:mhighmore:Documents:Report plan y12.docx Created on 21/01/2008 13:33
Why is E- Commerce more susceptible to threats than normal commerce?
What information has the customer given to the website?
What are the threats to Data Security for E-Commerce?
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What are the preventative methods for these threats?
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Describe the legislation that the business should be aware of:
1.
2.
3.
4.
5.
How effective are these pieces of legislation?
1.
2.
3.
4.
5.
Overall conclusions:
Is data secure on this website – yes:
1.
2.
3.
Is data insecure on this website – no:
1.
2.
3.
Overall conclusion:
1.
2.
3.
Macintosh HD:Users:mhighmore:Documents:Report plan y12.docx Created on 21/01/2008 13:33
Monday, 7 January 2008
Marks for part 1 of the digital economy project
Liam:
The screenshot pictures are quite small and hard to see what you are referring to. But the research is very good and well written.
Well done.
9/10
Abigail:
Excellent work Abi, some very detailed sections. Lots of relevant screen shots. The font size on some pages is too large and not consistent, please recreate the pdfs with a consistent font size thanks. 9/10
Natasha:
Generally good, some big full screenshots of the website would be useful so that we can guage the structure and layout of it. Well written but it needs a little more detail in most sections about what is available of this website and how the customer uses it especially in the transaction section.
7/10
Steph:
Excellent overall, but the transaction section lets it down a little, it is very brief and does not really live up to the rest of the work you have done. Excellent detail generally, some more bigger screenshots in the transaction section would improve this.
9/10
The screenshot pictures are quite small and hard to see what you are referring to. But the research is very good and well written.
Well done.
9/10
Abigail:
Excellent work Abi, some very detailed sections. Lots of relevant screen shots. The font size on some pages is too large and not consistent, please recreate the pdfs with a consistent font size thanks. 9/10
Natasha:
Generally good, some big full screenshots of the website would be useful so that we can guage the structure and layout of it. Well written but it needs a little more detail in most sections about what is available of this website and how the customer uses it especially in the transaction section.
7/10
Steph:
Excellent overall, but the transaction section lets it down a little, it is very brief and does not really live up to the rest of the work you have done. Excellent detail generally, some more bigger screenshots in the transaction section would improve this.
9/10
Sunday, 6 January 2008
Part 2 of the Digital Economy project, Back office processes
Back Office Processes
You must produce some diagrams to show the main events that lead to an online purchase being made and those that take place once the purchase has been completed. These diagrams should show all the "back-office processes", such as:
Registering and logging in | Searching for products | Tracking customers' actions | Maintaining the virtual shopping basket | Abandoned baskets |
The checkout process | Stock control | Authorising Payment | Confirming and tracking an order | Despatch and delivery |
Your diagrams should show the chain of events and the information that flows between the customer, the different departments in the organisation, suppliers and other organisations that may be involved.
It is not strictly necessary to give a written description to accompany the diagrams but the diagrams should be clear and easy to understand, so pay attention to keys and labelling.
Subscribe to:
Posts (Atom)