ABSTRACT
As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology. The good news is that, the complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime, aids crime prevention and assist investigation when positively utilized. Authentication plays a critical in security related applications like e-commerce websites. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention in e-commerce and security systems at large. Having realized the values of biometrics for two basic purposes namely to verify (authenticate) and identify (recognize). There are numbers of biometrics and different system (application) needs different biometrics. In this research, how to maximize e-commerce security is considered using different biometrics. Also, e-commerce application and systems that has implemented biometrics technology is reviewed.
TABLE OF CONTENTS
TITLE PAGES i & ii
CERTIFICATION iii
DEDICATION iv
ACKNOWLEDGEMENT v
ABSTRACT vi
TABLE OF CONTENTS vii-ix
LIST OF FIGURES x
LIST OF TABLES x
CHAPTER ONE – Introduction 1
1.1 Background of study 2
1.2 Objectives of study 4
1.3 Scope of the study 5
1.4 Motivation 6
1.5 Statement of Problem
1.6 Limitation of study
1.7 Methodology 6
CHAPTER TWO – Literature Review 11
2.1 Introduction 11
2.2 Review of verification systems 11
CHAPTER THREE – System Analysis and Design 29
3.1 Introduction 29
3.2 System analysis of the system 29
3.3 Constraints of the existing system 31
3.4 Proposed system design 33
3.4.1 System algorithm design 33
3.4.2 Input design 39
3.4.3 Interface design 41
3.4.4 Output design 42
3.4.5 System database design 43
3.5 Technology, tools and programming language used 45
CHAPTER FOUR – Design and Implementation 48
4.0 Introduction 48
4.1 System design 48
4.2 System description 49
4.3 System implementation 52
4.4 Hardware requirement 53
4.5 Software requirement 53
4.6 System testing 54
4.7 System review and maintenance 54
4.8 Installation procedure 55
4.9 User guide 55
CHAPTER FIVE – Summary and Conclusion 57
5.1 Summary 57
5.2 Recommendation 58
5.3 Conclusion 58
REFERENCE 60
APPENDIX (SOURCE CODES) 62
LIST OF FIGURES
1.1 The SSADM Approach. 8
1.2 The RAD Model. 9
2.1 Credit/Debit Card – front and back view 28
3.1 Input form to add Administrator 40
3.2 The main interface form 41
3.3a Verification Form 42
3.3b The Verification Result form 43
3.4 System’s database table for Admin 45
4.1 Use Case diagram for SVS 51
LIST OF TABLES
2.1 Address Verification Service – the types 13
2.2 Address Verification Service – detail description 17
3.1 Company Table 44
CHAPTER ONE
INTRODUCTION
- BACKGROUND OF THE STUDY
In the emerging global economy, e-commerce has increasingly become a necessary component of business strategy and a strong catalyst for economic development. The integration of information technology (IT) in business has revolutionized relationships within organizations and those between and among organizations and individuals. Specifically, the use of IT in business has enhanced productivity, encouraged greater customer participation, and enabled mass customization, besides reducing costs.
As electronic-commerce (e-commerce) grows and further exploits the attributes of the Internet, it will likely have significant effects on national economies and industry structure. E-commerce has come to take on two important roles; first as a more effective and efficient conduit and aggregator of information, and second, as a potential mechanism for the replacement of many economic activities once performed within a business enterprise by those that can be done by outside suppliers that compete with each other to execute these activities. In response to this increased level of outsourcing opportunities, businesses will exploit the benefits of e-commerce by decoupling as many links of their production chain as possible in order to seek the most efficient and low cost supplier within the e-marketplace. As the Internet has a global reach, these new e-marketplaces have fast become a product of globalization, leading the Internet and e-commerce to further the process of global integration.
According to Uzoka in Hampo, J.A (2011), “Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”It is recognized that in the Information Age, Internet commerce is a powerful tool in the economic growth of developing countries. While there are indications of ecommerce patronage among large firms in developing countries, there seems to be little and negligible use of the Internet for commerce among small and medium sized firms. E-commerce promises better business for SMEs and sustainable economic development for developing countries. However, this is premised on strong political will and good governance, as well as on a responsible and supportive private sector within an effective policy framework.
1.2 STATEMENT OF THE PROBLEM
Most importantly, the issues of security still remain a big bow to electronic commerce (e-commerce).this is due to the negligence of biometric. Moreover, some other problems of e-commerce are:
- High Internet access costs, including connection service fees, communication fees, and hosting charges for websites with sufficient bandwidth;
- Non availability of user friendly e-commerce website for online shoppers.
- Limited availability of credit cards and a nationwide credit card system;
- Underdeveloped transportation infrastructure resulting in slow and uncertain delivery of goods and services;
- Network security problems and insufficient security safeguards;
- Lack of skilled human resources and key technologies (i.e., inadequate professional IT workforce);
- Content restriction on national security and other public policy grounds, which greatly affect business in the field of information services, such as the media and entertainment sectors;
- Cross-border issues, such as the recognition of transactions under laws of other ASEAN member-countries, certification services, improvement of delivery methods and customs facilitation; and
- The relatively low cost of labor, which implies that a shift to a comparatively capital intensive solution (including investments on the improvement of the physical and network infrastructure) is not apparent.
1.3 AIMS AND OBJECTIVES
The aim of the research is to examine e-commerce and its relationship with information technology and biometrics;
The objectives are:
- To describe the role of information technology (IT) in e-commerce
- To outline some e-commerce technology
- To itemize biometric technology and its role in maximizing e-commerce security
- To describe common e-commerce model
- To explain the various forces fueling e-commerce
- e-Commerce insecurity
- To show electronic gadget that has biometrics and e-commerce feature(s).
- To analyze (and not design) an existing ecommerce system especially ecommerce system with biometrics technology.
1.4 SIGNIFICANCE OF THE STUDY
This research work will be of great importance to individuals, firms and organizations that are involved in e-commerce or those who intend to trade business online.
1.5 SCOPE
This research work discusses the role of information technology and biometrics to e-commerce security.
1.6 LIMITATION
Time and financial constraints has constrained this research work to the above scope.
1.7 METHODOLOGY
In this research we intend to carry out a system study which will involve visiting of most e-commerce websites to see how well information technology tools and biometrics are used in these websites, and the various limitations. A feasibility study will be carry out after the system study to determine if there are software, hardware and resources available to accomplish a solution. System analysis will then follow, which will include various fact finding techniques such as brainstorming, interviews and observation. The materials and literature review are utilized to the optimum.
1.8 MOTIVATION
In a technological driven generation where technology is used for both positive and negative gain, security remains at the mind of every well orientated human for profit making, customers’ safety and brand protection. Hence, we were motivated to show in this work how information technology tools and biometrics can be used foster the security of e-commerce that will be both beneficial for online shoppers and online shop owners.
DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.