Define the concept of online marketing through compared to the traditional
concept of marketing:
We will try to accomplish that in the following:
1.
Internet does not belong to any organization.
2.
Internet an open network, and not a closed network such as those owned by cable companies or communications
Telephone.
3.
Internet and interactive way and not a mass such as television and magazines.
4.
In the industrial age was marketers in control of the reins from the beginning to the end. As
In the Internet age, the reins become gradually turn into the hands of customers.
5.
No longer rotation between effectiveness and efficiency list, in the era of the Internet should be
Marketer to satisfy the needs of existing and future customers effectively and efficiently.
6.
Exchanges no longer revolves around the exchange of singly and in a specific period of time.
Valmsoukon
Internet era became working to satisfy the needs and desires through a large-scale
Providing packages commodity and service variety.
Third: defining the concept of Internet marketing on the basis of different positions around him:
There are two or two entrances towards the concept of Internet marketing are:
Entrance silent Marketer: the proponents of this approach that the task of the marketer is silent
Focus on attracting customers to its position without the need for direct interaction with them.
After that
The responsibility lies with the the Orders automated system in which all positions
The network is fully locked.
Entrance to the active participation: Valambaat according to this entrance is achieved through the active participation
In discussion forums, and mailing glossaries, and and other online auctions, where you can
Foundation collection, management and analysis of information about potential customers and business partners
To maintain their competitiveness.
Fourth: defining the concept of online marketing through changing laws that governed:
Law impasse: the following states "The creation of a Web site like a
Building and store front in a deadlock.
If you want to comes Almtdon to store
This, it should be for you to provide them with an excuse or a reason to invite them to come to you, "not all of
Have a Web site achieves success. Only those who use and skills
Hotshot marketer together online techniques the upscale they who are able to achieve
Impossible.
Giveaway and sales law: which states to attract visitors to your site by giving them something
For free, and then try to sell something additional to those who .
Trust law: where reads as follows: "Trust is the grease lubrication on businesses
The network. Without this confidence depends hinted rack and ending his life. "Accordingly the online
Entails building site and build confidence through this site.
Drag-and-pay law: This law provides for the following: "drag people to your site
Through attractive content s m upscale push information at them regularly through e-
Mail. "
Follow this law guarantees the institution repeat purchase by the customer, so when working
Foundation to provide goods and services to exceed their expectations levels.
That owns (AMAZON.COM) 5.
Law decent site: large institutions such as could
The entire market segments because it has rich experience and enormous potential. Smaller institutions
Its success depends on finding a decent positions that are either not packed or semi-packed, and in both cases
The Foundation small fill these positions by offering unique products or services in every sense
The word, and to maintain these positions through a competitive advantage over others.
Thus, online marketing requires the necessities to be bound by these basic laws
Five. They are all important, there's no law is more important than other laws. They are combined
Tmahdmsouk via the Internet in particular, the way to create and configure a successful business opportunities on the web.
Based on the above it is clear that Internet marketing is part of a broader activity is
E-marketing, and is one of the means.
Where e-marketing a broader and more comprehensive than
Internet marketing. Latter is in those marketing activities that rely on the internet
Specifically, although it is most common now, as a result of the increasing growing Internet usage in various
Contemporary business activities.
The third requirement: the advantages of e-marketing
The most important advantages and benefits caused by the application of e-marketing when the marketing plan includes
: Achieving integration between the WHO web site on the internet and the rest of the other marketing tools as follows
Expand the customer base a result entry intraday and the of durable, the site is always open and can be
entry to him by the client the international too.
Reduce costs and help achieve the flexibility of the marketing budget.
Cruise in the relationship between the seller and the buyer through the channels of communication Statistics
And direct interaction in order to achieve a strong relationship between the two.
Reduce paperwork for more attention to the needs of the client.
Reduce the time of completion of the transaction, as all stages of the marketing process can be
By direct service to computers and the Internet.
Easily enter into new markets and provide access to all markets
And global recognition for its products, and access to customers anywhere without Meet the hands of
Geographical borders.
7.
Increase the ability to collect detailed information on customers and on the survey and evaluation
Mail What helps in the improvement and development of market analysis. Analysis in addition to developing
Products by the possibility of the collection and examination, collation and dissemination of information about products
Via the Internet.
8.
The greatest potential to benefit from the help and advice of experts and specialists.
9.
The use of Web sites to disseminate information at a low cost marketing c the Da compared to the cost of
Advertising in other media, allowing customers to choose from more than one provider
For the service.
10.
The provision of a new marketing method, fast and outstanding customer to the masses, as they
Require detailed information about the goods and services they want to buy, which
Encourage them to make the right decision and choose what suits them for awareness and confidence.
11. Flexibility in the presentation of information about products and services quickly updated with
Information quickly and at limited additional cost, including institutions that can reward the best
Customers during raid information on prices and special offers for products and services.
12.
The ability to track visitors to the site for their assessment through the use of special programs such as
1. COOKIE
13.
Run faster processing and more efficient queries and customer inquiries.
The ability to identify target customer and provide value-added services to him
The level of cost does not compare for a traditional marketing campaign.
15.
Institutions can provide a higher level of service, such as custom manufacturing
In large numbers, and offer individual discounts according to the pattern of previous purchase of the Client
And preferences.
16. Smart organization can take advantage of the new ways in which Tq blood in the network
The area of customer service.
17. Institutions can through the collection, management, analysis and distribution of information about
Customers to understand their needs and identify the opportunities available to them better and evolution
In light of this and strengthen its relationship with customers and improve their services and product profitability
And services and provide valuable new performances. After knowing the advantages of e-marketing,
Is necessary to know the basic features that have been discriminate these traditional marketing environment and this
Features are: 1
1. Susceptibility selection: technology has made online visitors can identify network sites
Themselves and provide information on their needs and desires of products before embarking on purchases and the ability of
Any market to identify customers before they submit to the process of buying on MERCHANTABILITY invited to the selection.
The offer portability Selection express the basic concept of marketing., And with the knowledge that they collect from customers
Using their positions in the network the international .
2. Reaction: The the distinctive feature of the e-marketing is the interaction that allows customers to express
Their needs and desires directly to the institution and this means that Touch and disabilities can interact with customers
Financiers in real time.
Of course, the individuals existing sales process are always able
Work on this, but at a greater cost.
International Network offers the advantages of having or attending a sales representative
But a wider coverage and lower cost.
3. Memory: Memory refers to the organization's ability to access databases or data warehouses
Containing information about the customer and dates of previous purchase, and use this data in a timely
Real or actual offer presentation catalog for a particular customer.
4. Control: The network the International referred to it as a way to withdraw certain, because users
Ih Ddon what Istardoh in web sites the international and the ability of workers in the site of the International Network
To control the content that users care about and comes a limited context and organization uses text
Superior in content marketing is can not the control the the context which sees the browser
Content.
5. Portability Login: There is an unusual amount of information in the Internet., And the ability to obtain
It is referred to ability to the entry. Because customers can enter a lot of information on
Products and services for any organization and the relative value of any earlier.
6. Method the digital : refers method the digital-to-the ability to view a particular product or service or on
At least some of the products or services as digital parts of the information and means method the digital site
Internet, which can be used to distribute and promote those attributes, regardless of the physical single
Itself. Vocabulary is characterized by the digital as easily mix and work to meet customer requests each
Them freed.
II. Effectiveness of e-marketing: to succeed the process of e-marketing. Process be successful
And effective, it should be available by the number of elements, including: 1
1. The benefit to the customer: the institution should seek to provide sufficient and clear benefit through
Ask a product (good or service) via the Internet.
It follows the level of this benefit the customer's decision
Repeat or not to repeat the purchase process. Therefore should include all website content
Promotive services that are responsive to the wishes of the customer and that the Foundation seeks to swans the YZ through the provision of
Unique and distinct benefits to its customers.
2. Achieve integration with all the activities of the e-business: the institution should seek to achieve
Integration of e-marketing and the rest of the e-business activities so that these activities are reflected in the
Each stage of the marketing process., For example, can not take place and the process
Selling successfully if there is no interaction and integration with systems the payment via the Internet. If there is no security systems
And effective protection.
3. The ability to view the contents of Web services in the form of actors:
Should be presented in various content and services within the Web site are appropriate to the new nature
E-Business.
And are different from the methods used in the field of traditional business.
The content of the site should include three basic aspects of marketing are:
A - providing the necessary and sufficient information about the products offered for sale online
B - enabling the client to communicate and interact with important elements in the marketing process, such as vendors, Director
Site, reference groups, ...
C - effectively achieve the exchange process.
This requires providing all of the following needs and desires of the client.
And the provision of
Supplementary services relating to Mountoj (good or service).
4. Simple construction and innovation of the web site: should be constructed in a simple and innovative facilitates
Client on the process of obtaining data and information and the conduct of interaction and exchange. For
Example, should not exceed the number of links that lead to the final information for the three links
This is necessary to facilitate the process and Anjazaha. LAYERS steps or pages or LINKS layers of the
Quickly.
Achieving this requires to achieve a balance between three interrelated elements:
A - view and provide adequate and necessary information with the shortcut as much as possible in order to preserve the time
To achieve the client speed.
B - providing accurate information that the client is looking for exclusively.
C - achieve the Table organization by the pages of the Web site.
However, despite the availability of the above-mentioned elements can be e-marketing process ineffective or
Is successful, if there is no element of safety.
The continued expansion in the use of the Internet to transfer data
Between many destinations and increasing applications, a de to ask many questions by users such as: Is
Personal information is safe?, And whether information can be revealed someone's account to others when
Queries via the Internet?
Is it possible to steal your credit card number when you the market by
Internet?
To answer these and other questions we will discuss in the pro most important requirement based on safety standards
Online.
The requirement fourth: Security-mail:
One of the most important obstacles to transforming the Internet into the commercial market inadequate security across it.
Because of Operations
Rejects many. (INTERNET HACKER) penetration and subversion practiced by thieves online
Internet users conduct of a financial nature across the network.
Internet has succeeded institutions develop technological solutions effective and able to achieve effective security
And confidential commercial and financial transactions over the Internet.
Since 1998, companies began warranty cards
And computer companies offering and build a set of security standards for transactions and exchanges
Trade that takes place across the network, where it became a high level of security and the secret.
1
Among the most important of these standards include:
(Open Buying on the Internet) OBI: 1. Standard purchase online Open
The efforts directed to develop a set of standards that are able to achieve the security and confidentiality
Financial transactions that take place via the Internet in order to facilitate and raise the level of security effectiveness.
The standard
Seeks to be a unified standard agreed to keep up with the type of yolk number OBI Open the buy online
This standard is sponsored by (B2B) e-business types a business-to-business
Company and General Electric Company, Ford and supported by well-known companies such as: American Express Company
.2 United Technologies Corporation, BASF
(Open Financial Exchange Specification) OFX: 2. Specification Open Financial Exchange
This specification has been designed and developed in order to deal with a specific type of institutions.
They are
Based on addressing the issues of security and confidentiality concerning financial transactions between financial institutions
And as well as between these institutions and between their customers and which are made via the Internet.
This specification covers a variety of financial institutions.
And has seen many applications in the field of business
Small banking and financial dealings with customers.
Microsoft in 1997, was designed and nurtured OFX companies and has been the beginning of the use of
And has been supported and endorsed by most financial institutions, Cheek Free, Inuit and
3.Bank of America and Citibank like ancient
(Electronic Funds Transfer) ETF: 3. Electronic remittance system
Is a crucial part of the infrastructure for electronic banking business that operates online
This system allows electronic safe way transfer of remittances or financial payments from a bank account
To another bank account, in addition to the transfer of information relating to these transfers, and the advantage of this system
A high degree of security and ease of use and reliability, the conversion process is the financial-mail
The signing of a model dependent client and one for the benefit of the beneficiary, and allows this form truncated value
Specific customer's account in a certain chronological order (daily, weekly, or monthly), and differs from model
Electronic money transfer check that the validity apply for more than one conversion process, and in the
Usually handles the bank and the client with their job brokers provide the software needed to process transfers.
(Electronic Data Interchange) EDI: 4. Electronic data exchange system
Is a collection of software used in the exchange of information between computers of partners
Trading partners, and the implementation of electronic business transactions in a manner not adopt the paper, and the operations of the
Electronic data exchange system: queries, purchase orders, pricing, scheduling, shipping
And reception, billing and payments, contracts, production data, in addition to sales; using algorithms
Prevent fraud, espionage or hacking.
2
(Secure Electronic Transactions) SET: 5. Specification secure financial transactions
Visa card, Microsoft IBM, secure financial transactions standard adopted by the Company
Boil the Internet.
Consumers »: Engen Lockart Mr. Master Card where he told General Manager
They can use their cards to perform banking transactions in the virtual space with the same level of security
3 «.
And ease when using their cards in shops
And has been the use of a standard Secure financial transactions in the first exchange of Mali in 1997
United States of America.
To achieve a set of goals, including: SET and seeks
Achieve a high level of trust and security in data and information
We will try to accomplish that in the following:
1.
Internet does not belong to any organization.
2.
Internet an open network, and not a closed network such as those owned by cable companies or communications
Telephone.
3.
Internet and interactive way and not a mass such as television and magazines.
4.
In the industrial age was marketers in control of the reins from the beginning to the end. As
In the Internet age, the reins become gradually turn into the hands of customers.
5.
No longer rotation between effectiveness and efficiency list, in the era of the Internet should be
Marketer to satisfy the needs of existing and future customers effectively and efficiently.
6.
Exchanges no longer revolves around the exchange of singly and in a specific period of time.
Valmsoukon
Internet era became working to satisfy the needs and desires through a large-scale
Providing packages commodity and service variety.
Third: defining the concept of Internet marketing on the basis of different positions around him:
There are two or two entrances towards the concept of Internet marketing are:
Entrance silent Marketer: the proponents of this approach that the task of the marketer is silent
Focus on attracting customers to its position without the need for direct interaction with them.
After that
The responsibility lies with the the Orders automated system in which all positions
The network is fully locked.
Entrance to the active participation: Valambaat according to this entrance is achieved through the active participation
In discussion forums, and mailing glossaries, and and other online auctions, where you can
Foundation collection, management and analysis of information about potential customers and business partners
To maintain their competitiveness.
Fourth: defining the concept of online marketing through changing laws that governed:
Law impasse: the following states "The creation of a Web site like a
Building and store front in a deadlock.
If you want to comes Almtdon to store
This, it should be for you to provide them with an excuse or a reason to invite them to come to you, "not all of
Have a Web site achieves success. Only those who use and skills
Hotshot marketer together online techniques the upscale they who are able to achieve
Impossible.
Giveaway and sales law: which states to attract visitors to your site by giving them something
For free, and then try to sell something additional to those who .
Trust law: where reads as follows: "Trust is the grease lubrication on businesses
The network. Without this confidence depends hinted rack and ending his life. "Accordingly the online
Entails building site and build confidence through this site.
Drag-and-pay law: This law provides for the following: "drag people to your site
Through attractive content s m upscale push information at them regularly through e-
Mail. "
Follow this law guarantees the institution repeat purchase by the customer, so when working
Foundation to provide goods and services to exceed their expectations levels.
That owns (AMAZON.COM) 5.
Law decent site: large institutions such as could
The entire market segments because it has rich experience and enormous potential. Smaller institutions
Its success depends on finding a decent positions that are either not packed or semi-packed, and in both cases
The Foundation small fill these positions by offering unique products or services in every sense
The word, and to maintain these positions through a competitive advantage over others.
Thus, online marketing requires the necessities to be bound by these basic laws
Five. They are all important, there's no law is more important than other laws. They are combined
Tmahdmsouk via the Internet in particular, the way to create and configure a successful business opportunities on the web.
Based on the above it is clear that Internet marketing is part of a broader activity is
E-marketing, and is one of the means.
Where e-marketing a broader and more comprehensive than
Internet marketing. Latter is in those marketing activities that rely on the internet
Specifically, although it is most common now, as a result of the increasing growing Internet usage in various
Contemporary business activities.
The third requirement: the advantages of e-marketing
The most important advantages and benefits caused by the application of e-marketing when the marketing plan includes
: Achieving integration between the WHO web site on the internet and the rest of the other marketing tools as follows
Expand the customer base a result entry intraday and the of durable, the site is always open and can be
entry to him by the client the international too.
Reduce costs and help achieve the flexibility of the marketing budget.
Cruise in the relationship between the seller and the buyer through the channels of communication Statistics
And direct interaction in order to achieve a strong relationship between the two.
Reduce paperwork for more attention to the needs of the client.
Reduce the time of completion of the transaction, as all stages of the marketing process can be
By direct service to computers and the Internet.
Easily enter into new markets and provide access to all markets
And global recognition for its products, and access to customers anywhere without Meet the hands of
Geographical borders.
7.
Increase the ability to collect detailed information on customers and on the survey and evaluation
Mail What helps in the improvement and development of market analysis. Analysis in addition to developing
Products by the possibility of the collection and examination, collation and dissemination of information about products
Via the Internet.
8.
The greatest potential to benefit from the help and advice of experts and specialists.
9.
The use of Web sites to disseminate information at a low cost marketing c the Da compared to the cost of
Advertising in other media, allowing customers to choose from more than one provider
For the service.
10.
The provision of a new marketing method, fast and outstanding customer to the masses, as they
Require detailed information about the goods and services they want to buy, which
Encourage them to make the right decision and choose what suits them for awareness and confidence.
11. Flexibility in the presentation of information about products and services quickly updated with
Information quickly and at limited additional cost, including institutions that can reward the best
Customers during raid information on prices and special offers for products and services.
12.
The ability to track visitors to the site for their assessment through the use of special programs such as
1. COOKIE
13.
Run faster processing and more efficient queries and customer inquiries.
The ability to identify target customer and provide value-added services to him
The level of cost does not compare for a traditional marketing campaign.
15.
Institutions can provide a higher level of service, such as custom manufacturing
In large numbers, and offer individual discounts according to the pattern of previous purchase of the Client
And preferences.
16. Smart organization can take advantage of the new ways in which Tq blood in the network
The area of customer service.
17. Institutions can through the collection, management, analysis and distribution of information about
Customers to understand their needs and identify the opportunities available to them better and evolution
In light of this and strengthen its relationship with customers and improve their services and product profitability
And services and provide valuable new performances. After knowing the advantages of e-marketing,
Is necessary to know the basic features that have been discriminate these traditional marketing environment and this
Features are: 1
1. Susceptibility selection: technology has made online visitors can identify network sites
Themselves and provide information on their needs and desires of products before embarking on purchases and the ability of
Any market to identify customers before they submit to the process of buying on MERCHANTABILITY invited to the selection.
The offer portability Selection express the basic concept of marketing., And with the knowledge that they collect from customers
Using their positions in the network the international .
2. Reaction: The the distinctive feature of the e-marketing is the interaction that allows customers to express
Their needs and desires directly to the institution and this means that Touch and disabilities can interact with customers
Financiers in real time.
Of course, the individuals existing sales process are always able
Work on this, but at a greater cost.
International Network offers the advantages of having or attending a sales representative
But a wider coverage and lower cost.
3. Memory: Memory refers to the organization's ability to access databases or data warehouses
Containing information about the customer and dates of previous purchase, and use this data in a timely
Real or actual offer presentation catalog for a particular customer.
4. Control: The network the International referred to it as a way to withdraw certain, because users
Ih Ddon what Istardoh in web sites the international and the ability of workers in the site of the International Network
To control the content that users care about and comes a limited context and organization uses text
Superior in content marketing is can not the control the the context which sees the browser
Content.
5. Portability Login: There is an unusual amount of information in the Internet., And the ability to obtain
It is referred to ability to the entry. Because customers can enter a lot of information on
Products and services for any organization and the relative value of any earlier.
6. Method the digital : refers method the digital-to-the ability to view a particular product or service or on
At least some of the products or services as digital parts of the information and means method the digital site
Internet, which can be used to distribute and promote those attributes, regardless of the physical single
Itself. Vocabulary is characterized by the digital as easily mix and work to meet customer requests each
Them freed.
II. Effectiveness of e-marketing: to succeed the process of e-marketing. Process be successful
And effective, it should be available by the number of elements, including: 1
1. The benefit to the customer: the institution should seek to provide sufficient and clear benefit through
Ask a product (good or service) via the Internet.
It follows the level of this benefit the customer's decision
Repeat or not to repeat the purchase process. Therefore should include all website content
Promotive services that are responsive to the wishes of the customer and that the Foundation seeks to swans the YZ through the provision of
Unique and distinct benefits to its customers.
2. Achieve integration with all the activities of the e-business: the institution should seek to achieve
Integration of e-marketing and the rest of the e-business activities so that these activities are reflected in the
Each stage of the marketing process., For example, can not take place and the process
Selling successfully if there is no interaction and integration with systems the payment via the Internet. If there is no security systems
And effective protection.
3. The ability to view the contents of Web services in the form of actors:
Should be presented in various content and services within the Web site are appropriate to the new nature
E-Business.
And are different from the methods used in the field of traditional business.
The content of the site should include three basic aspects of marketing are:
A - providing the necessary and sufficient information about the products offered for sale online
B - enabling the client to communicate and interact with important elements in the marketing process, such as vendors, Director
Site, reference groups, ...
C - effectively achieve the exchange process.
This requires providing all of the following needs and desires of the client.
And the provision of
Supplementary services relating to Mountoj (good or service).
4. Simple construction and innovation of the web site: should be constructed in a simple and innovative facilitates
Client on the process of obtaining data and information and the conduct of interaction and exchange. For
Example, should not exceed the number of links that lead to the final information for the three links
This is necessary to facilitate the process and Anjazaha. LAYERS steps or pages or LINKS layers of the
Quickly.
Achieving this requires to achieve a balance between three interrelated elements:
A - view and provide adequate and necessary information with the shortcut as much as possible in order to preserve the time
To achieve the client speed.
B - providing accurate information that the client is looking for exclusively.
C - achieve the Table organization by the pages of the Web site.
However, despite the availability of the above-mentioned elements can be e-marketing process ineffective or
Is successful, if there is no element of safety.
The continued expansion in the use of the Internet to transfer data
Between many destinations and increasing applications, a de to ask many questions by users such as: Is
Personal information is safe?, And whether information can be revealed someone's account to others when
Queries via the Internet?
Is it possible to steal your credit card number when you the market by
Internet?
To answer these and other questions we will discuss in the pro most important requirement based on safety standards
Online.
The requirement fourth: Security-mail:
One of the most important obstacles to transforming the Internet into the commercial market inadequate security across it.
Because of Operations
Rejects many. (INTERNET HACKER) penetration and subversion practiced by thieves online
Internet users conduct of a financial nature across the network.
Internet has succeeded institutions develop technological solutions effective and able to achieve effective security
And confidential commercial and financial transactions over the Internet.
Since 1998, companies began warranty cards
And computer companies offering and build a set of security standards for transactions and exchanges
Trade that takes place across the network, where it became a high level of security and the secret.
1
Among the most important of these standards include:
(Open Buying on the Internet) OBI: 1. Standard purchase online Open
The efforts directed to develop a set of standards that are able to achieve the security and confidentiality
Financial transactions that take place via the Internet in order to facilitate and raise the level of security effectiveness.
The standard
Seeks to be a unified standard agreed to keep up with the type of yolk number OBI Open the buy online
This standard is sponsored by (B2B) e-business types a business-to-business
Company and General Electric Company, Ford and supported by well-known companies such as: American Express Company
.2 United Technologies Corporation, BASF
(Open Financial Exchange Specification) OFX: 2. Specification Open Financial Exchange
This specification has been designed and developed in order to deal with a specific type of institutions.
They are
Based on addressing the issues of security and confidentiality concerning financial transactions between financial institutions
And as well as between these institutions and between their customers and which are made via the Internet.
This specification covers a variety of financial institutions.
And has seen many applications in the field of business
Small banking and financial dealings with customers.
Microsoft in 1997, was designed and nurtured OFX companies and has been the beginning of the use of
And has been supported and endorsed by most financial institutions, Cheek Free, Inuit and
3.Bank of America and Citibank like ancient
(Electronic Funds Transfer) ETF: 3. Electronic remittance system
Is a crucial part of the infrastructure for electronic banking business that operates online
This system allows electronic safe way transfer of remittances or financial payments from a bank account
To another bank account, in addition to the transfer of information relating to these transfers, and the advantage of this system
A high degree of security and ease of use and reliability, the conversion process is the financial-mail
The signing of a model dependent client and one for the benefit of the beneficiary, and allows this form truncated value
Specific customer's account in a certain chronological order (daily, weekly, or monthly), and differs from model
Electronic money transfer check that the validity apply for more than one conversion process, and in the
Usually handles the bank and the client with their job brokers provide the software needed to process transfers.
(Electronic Data Interchange) EDI: 4. Electronic data exchange system
Is a collection of software used in the exchange of information between computers of partners
Trading partners, and the implementation of electronic business transactions in a manner not adopt the paper, and the operations of the
Electronic data exchange system: queries, purchase orders, pricing, scheduling, shipping
And reception, billing and payments, contracts, production data, in addition to sales; using algorithms
Prevent fraud, espionage or hacking.
2
(Secure Electronic Transactions) SET: 5. Specification secure financial transactions
Visa card, Microsoft IBM, secure financial transactions standard adopted by the Company
Boil the Internet.
Consumers »: Engen Lockart Mr. Master Card where he told General Manager
They can use their cards to perform banking transactions in the virtual space with the same level of security
3 «.
And ease when using their cards in shops
And has been the use of a standard Secure financial transactions in the first exchange of Mali in 1997
United States of America.
To achieve a set of goals, including: SET and seeks
Achieve a high level of trust and security in data and information
Make sure the payment process.
Legitimize and reliability on electronic shopkeepers and credit cardholders.
The basic requirements and needs that have been focused on and expressed within the standard
Has been divided into the following: SET
Any data and information transfer and sent via the Internet must remain confidential, and should not be able to
Access and be accessed only from the party on their future and that against him.
Must remain content of any process of exchange is subject to change during the data transfer process
It can design an electronic signature, and can SET and information, and using Moasf
To say that the inclusion of this signature within the data and information process helps to discover whether
There was a change in the course of transportation and transmission.
Store-mail needs to be assured that the payment card holder is the rightful owner of the No.
Payment card account, and on the other hand, it must be able to cardholder verification
The identity of the owner of the store address, and be confident that this store is able to achieve
To provide a set of standards achieved SET certifications secure financial transactions, and operates Specification
Electronic and these confer legitimacy on the identity of members who engage in the process of trade
Electronic.
Must be viable and execution on a wide range of tools SET 4.
Electronic, and that is not being preference programmatic entity or a specific physical entity on the other so
Be more capable of application and implementation of the specification.
(Secure Socket Layer) SSL: 6. Secure protocol layers
The secure transfer of information, Secure Socket Layer, which is the acronym for the SSL protocol
Between client and server.
Private) and private key (Public Key) This protocol is based on a public key algorithm
As the server provides the customer keys in general, and these public keys used to encrypt messages (Key
Flying to the server, and can not use the public key to decode The Da message that the Code, as unique
Private key (the server) with the ability to decode code message that the public key.
And This method prevents the emergence of communication problems, such as spying or eavesdropping when disclosure of information
Content, as this protocol helps to verify that the public key issued by the server and make sure
Information has not changed during transport, and using digital certificates.
And serve as digital certificates or identity card registration business enterprise license, exporter
Licensed party to an international destination, and used by the individual in the E-Government to encrypt and decrypt messages
Electronic and can assist the parties in check and recognize each and therefore used in
Ensure the security of commercial transactions and individual, which provides a safe environment to do business.
Institutions need to digital certificates in order to encode and decode electronic correspondence
And to determine the identities of the senders of e-mails and payment and purchase orders, sales, and access to sites
Web, and internal checks; digital certificates and find her role in archiving operations and save documents
To ensure that manipulated and changed only of VPL individuals and entities authorized to do so, in addition to
Dozens of other applications.
Legitimize and reliability on electronic shopkeepers and credit cardholders.
The basic requirements and needs that have been focused on and expressed within the standard
Has been divided into the following: SET
Any data and information transfer and sent via the Internet must remain confidential, and should not be able to
Access and be accessed only from the party on their future and that against him.
Must remain content of any process of exchange is subject to change during the data transfer process
It can design an electronic signature, and can SET and information, and using Moasf
To say that the inclusion of this signature within the data and information process helps to discover whether
There was a change in the course of transportation and transmission.
Store-mail needs to be assured that the payment card holder is the rightful owner of the No.
Payment card account, and on the other hand, it must be able to cardholder verification
The identity of the owner of the store address, and be confident that this store is able to achieve
To provide a set of standards achieved SET certifications secure financial transactions, and operates Specification
Electronic and these confer legitimacy on the identity of members who engage in the process of trade
Electronic.
Must be viable and execution on a wide range of tools SET 4.
Electronic, and that is not being preference programmatic entity or a specific physical entity on the other so
Be more capable of application and implementation of the specification.
(Secure Socket Layer) SSL: 6. Secure protocol layers
The secure transfer of information, Secure Socket Layer, which is the acronym for the SSL protocol
Between client and server.
Private) and private key (Public Key) This protocol is based on a public key algorithm
As the server provides the customer keys in general, and these public keys used to encrypt messages (Key
Flying to the server, and can not use the public key to decode The Da message that the Code, as unique
Private key (the server) with the ability to decode code message that the public key.
And This method prevents the emergence of communication problems, such as spying or eavesdropping when disclosure of information
Content, as this protocol helps to verify that the public key issued by the server and make sure
Information has not changed during transport, and using digital certificates.
And serve as digital certificates or identity card registration business enterprise license, exporter
Licensed party to an international destination, and used by the individual in the E-Government to encrypt and decrypt messages
Electronic and can assist the parties in check and recognize each and therefore used in
Ensure the security of commercial transactions and individual, which provides a safe environment to do business.
Institutions need to digital certificates in order to encode and decode electronic correspondence
And to determine the identities of the senders of e-mails and payment and purchase orders, sales, and access to sites
Web, and internal checks; digital certificates and find her role in archiving operations and save documents
To ensure that manipulated and changed only of VPL individuals and entities authorized to do so, in addition to
Dozens of other applications.
Post a Comment