CSI5389 – Exam Guidelines

 

The exam will be three hours.  There will be two case studies where you will be asked to apply your knowledge of e-commerce technologies to describe a technical solution to the requirements of the business situation.  Questions will guide to define the general infrastructure that needs to be set up, and the basic workings of the relevant business applications.  Follow up questions will ensure that you understand the relevant concepts and standards and how to apply them.  In addition, you may be shown specific code and/or document samples and asked questions relevant to the case study.

 

Below is a general outline or roadmap to the course as it relates to the final exam.

Electronic Commerce Technology - Definition

Electronic document processing and communication

Support of community and commercial activity

Regulated by standards, policies and law

 

General Infrastructure

            XML and Web Services

            Browser / Web Server Architecture

            Security

 

Business Applications

            Content Management

                        Search Engine

                        Personalization

            Commercial Transactions

                        Payment Processing

                        Auctions

            Elections

            Supply Chain Management

                        Auctions

            Customer Relationship Management

                        Data Mining

            Privacy Rights Management

            Digital Rights Management

 

Concepts

            B2B / B2C / C2C / G2B /G2C

            Content,  Convenience , Confidence

            Document Processing, Syntax vs Semantics, Content vs Presentation, Grammar (Abstract Syntax Tree) vs OO vs Relational

            Session, Cookie, Applet, ActiveX, web client, web server, template, db connection pool, secured pages

Search, inverted index, page rank, crawler

Firewalls, Virtual Private Network, Leased Lines,

            Symmetric vs Asymmetric Encryption, one-time pad, public & private key, certificate authority, Public Key Infrastructure

Privacy, Authentication, Integrity, Non-Repudiation

Blind signatures, electronic cash, elections, voter, tallier, validator, accurate, democratic, private, verifiable

            Commerce Value Chain : Attract , Interact, Act, React

            Web Service, Business Transaction, Order Pipeline

Offer, Payment, Fulfillment, Order Form, Payment Gateway, Customer, Merchant, Supplier

Data warehouse, data mart, OLAP, Cube, Data Visualization, Business Intelligence

Data mining, Association, Classification, Decision Trees, Rules, Predictive Accuracy, Lift, Return on Investment (ROI),

Value Proposition, Personalization, User Profile, Customer Segment, Promotion, Cross Sell, Up Sell, Click Through Rate,

Auctions (English, Dutch, First Price Sealed Bid, Vickrey, Double, Integrative, Multi-dimensional)

Winner’s Curse, Market Valuation, Collusion, Common Value, Reservation Price, Private Valuation

Agent, Agent Management System, Agent Communication Channel (ACC), Agent Communication Language (ACL), Ontology

Business Registry, Trading Exchanges, Trading Roles, Transactions, Messages

 

Standards and Protocols

IP, TCP, UDP

HTTP, HTML, URL

CGI, ISAPI, NSAPI, Servlets, JSP, ASP, J2EE, .NET

DES, RSA, SSL, SET, X.509

XML, DTD, XSLT, SAX, DOM

SOAP, WSDL, UDDI

XML Signature, XACML, SAML

P3P

IOTP, ebXML, FIPA, FIPA-ACL(CFP)