Page Length: 84

Size: 572 KB

Format: PDF & Word

5,000.00

ABSTRACT

 

As technology advance daily, attacks on computer system and computer applications are becoming tremendous and increasingly numerous and sophisticated. Thus, e-commerce is threatened due to negative use of technology. The good news is that, the complexity and anonymity of computer systems does not only aid crime in the society but also it’s a combating measure to crime, aids crime prevention and assist investigation when positively utilized. Authentication plays a critical in security related applications like e-commerce websites. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention in e-commerce and security systems at large. Having realized the values of biometrics for two basic purposes namely to verify (authenticate) and identify (recognize). There are numbers of biometrics and different system (application) needs different biometrics. In this research, how to maximize e-commerce security is considered using different biometrics. Also, e-commerce application and systems that has implemented biometrics technology is reviewed.

 

 

TABLE OF CONTENTS

TITLE PAGES                                                                        i & ii

CERTIFICATION                                                                            iii

DEDICATION                                                                        iv

ACKNOWLEDGEMENT                                                       v

ABSTRACT                                                                            vi

TABLE OF CONTENTS                                                                  vii-ix

LIST OF FIGURES                                                                 x

LIST OF TABLES                                                                            x

CHAPTER ONE – Introduction                                                       1

1.1     Background of study                                                     2

1.2     Objectives of study                                                        4

1.3     Scope of the study                                                                   5

1.4     Motivation                                                                     6

1.5     Statement of Problem

1.6     Limitation of study

1.7     Methodology                                                                           6

CHAPTER TWO – Literature Review                                                        11

2.1     Introduction                                                                                      11

2.2     Review of verification systems                                                         11

CHAPTER THREE – System Analysis and Design                                   29

3.1     Introduction                                                                                      29

3.2     System analysis of the system                                                 29

3.3     Constraints of the existing system                                          31

3.4     Proposed system design                                                          33

3.4.1  System algorithm design                                                                   33

3.4.2  Input design                                                                                      39

3.4.3  Interface design                                                                       41

3.4.4  Output design                                                                          42

3.4.5  System database design                                                           43

3.5     Technology, tools and programming language used                         45

CHAPTER FOUR – Design and Implementation                             48

4.0     Introduction                                                                                      48

4.1     System design                                                                         48

4.2     System description                                                                           49

4.3     System implementation                                                           52

4.4     Hardware requirement                                                             53

4.5     Software requirement                                                              53

4.6     System testing                                                                         54

4.7     System review and maintenance                                              54

4.8     Installation procedure                                                             55

4.9     User guide                                                                               55

CHAPTER FIVE – Summary and Conclusion                                 57

5.1     Summary                                                                                 57

5.2     Recommendation                                                                     58

5.3     Conclusion                                                                              58

REFERENCE                                                                                   60

APPENDIX (SOURCE CODES)                                                      62

 

 

LIST OF FIGURES

1.1     The SSADM Approach.                                                                   8

1.2     The RAD Model.                                                                     9

2.1     Credit/Debit Card – front and back view                                28

3.1     Input form to add Administrator                                            40

3.2     The main interface form                                                          41

3.3a   Verification Form                                                                    42

3.3b   The Verification Result form                                                   43

3.4     System’s database table for Admin                                         45

4.1     Use Case diagram for SVS                                                      51

LIST OF TABLES

2.1     Address Verification Service – the types                                 13

2.2     Address Verification Service – detail description                    17

3.1     Company Table                                                                       44

 

 

CHAPTER ONE

INTRODUCTION

  • BACKGROUND OF THE STUDY

In the emerging global economy, e-commerce has increasingly become a necessary component of business strategy and a strong catalyst for economic development. The integration of information technology (IT) in business has revolutionized relationships within organizations and those between and among organizations and individuals. Specifically, the use of IT in business has enhanced productivity, encouraged greater customer participation, and enabled mass customization, besides reducing costs.

As electronic-commerce (e-commerce) grows and further exploits the attributes of the Internet, it will likely have significant effects on national economies and industry structure. E-commerce has come to take on two important roles; first as a more effective and efficient conduit and aggregator of information, and second, as a potential mechanism for the replacement of many economic activities once performed within a business enterprise by those that can be done by outside suppliers that compete with each other to execute these activities. In response to this increased level of outsourcing opportunities, businesses will exploit the benefits of e-commerce by decoupling as many links of their production chain as possible in order to seek the most efficient and low cost supplier within the e-marketplace. As the Internet has a global reach, these new e-marketplaces have fast become a product of globalization, leading the Internet and e-commerce to further the process of global integration.

According to Uzoka in Hampo, J.A (2011), “Decisions are largely based on principles and experience. In recent times, efforts are being made to build intelligence into computer system, whereby the computer can be used to process large volume of structured and unstructured information for decision making.”It is recognized that in the Information Age, Internet commerce is a powerful tool in the economic growth of developing countries. While there are indications of ecommerce patronage among large firms in developing countries, there seems to be little and negligible use of the Internet for commerce among small and medium sized firms. E-commerce promises better business for SMEs and sustainable economic development for developing countries. However, this is premised on strong political will and good governance, as well as on a responsible and supportive private sector within an effective policy framework.

1.2     STATEMENT OF THE PROBLEM

Most importantly, the issues of security still remain a big bow to electronic commerce (e-commerce).this is due to the negligence of biometric. Moreover, some other problems of e-commerce are:

  1. High Internet access costs, including connection service fees, communication fees, and hosting charges for websites with sufficient bandwidth;
  2. Non availability of user friendly e-commerce website for online shoppers.
  3. Limited availability of credit cards and a nationwide credit card system;
  4. Underdeveloped transportation infrastructure resulting in slow and uncertain delivery of goods and services;
  5. Network security problems and insufficient security safeguards;
  6. Lack of skilled human resources and key technologies (i.e., inadequate professional IT workforce);
  7. Content restriction on national security and other public policy grounds, which greatly affect business in the field of information services, such as the media and entertainment sectors;
  8. Cross-border issues, such as the recognition of transactions under laws of other ASEAN member-countries, certification services, improvement of delivery methods and customs facilitation; and
  9. The relatively low cost of labor, which implies that a shift to a comparatively capital intensive solution (including investments on the improvement of the physical and network infrastructure) is not apparent.

1.3     AIMS AND OBJECTIVES

The aim of the research is to examine e-commerce and its relationship with information technology and biometrics;

The objectives are:

  1. To describe the role of information technology (IT) in e-commerce
  2. To outline some e-commerce technology
  3. To itemize biometric technology and its role in maximizing e-commerce security
  4. To describe common e-commerce model
  5. To explain the various forces fueling e-commerce
  6. e-Commerce insecurity
  7. To show electronic gadget that has biometrics and e-commerce feature(s).
  8. To analyze (and not design) an existing ecommerce system especially ecommerce system with biometrics technology.

1.4     SIGNIFICANCE OF THE STUDY

This research work will be of great importance to individuals, firms and organizations that are involved in e-commerce or those who intend to trade business online.

1.5     SCOPE

This research work discusses the role of information technology and biometrics to e-commerce security.

1.6     LIMITATION

Time and financial constraints has constrained this research work to the above scope.

1.7     METHODOLOGY

In this research we intend to carry out a system study which will involve visiting of most e-commerce websites to see how well information technology tools and biometrics are used in these websites, and the various limitations. A feasibility study will be carry out after the system study to determine if there are software, hardware and resources available to accomplish a solution. System analysis will then follow, which will include various fact finding techniques such as brainstorming, interviews and observation. The materials and literature review are utilized to the optimum.

1.8     MOTIVATION

In a technological driven generation where technology is used for both positive and negative gain, security remains at the mind of every well orientated human for profit making, customers’ safety and brand protection. Hence, we were motivated to show in this work how information technology tools and biometrics can be used foster the security of e-commerce that will be both beneficial for online shoppers and online shop owners.

DOWNLOAD COMPLETE WORK

DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.

WeCreativez WhatsApp Support
Administrator (Online)
Hello and welcome. I am online and ready to help you via WhatsApp chat. Let me know if you need my assistance.