0% found this document useful (0 votes)
24 views

Unit IV Last Two Questions

The document provides a 6-step model for evaluating websites: 1) Open the site, 2) Skim read to determine understandability and relevance, 3) Look for answers to your question, 4) Consider the author/site credibility, 5) Consider the site's purpose and potential biases, and 6) Check the date to ensure timeliness for the topic. The model aims to help users assess a site's trustworthiness, usefulness, and whether it provides accurate and up-to-date information to answer their question.

Uploaded by

Vignana Deepthi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Unit IV Last Two Questions

The document provides a 6-step model for evaluating websites: 1) Open the site, 2) Skim read to determine understandability and relevance, 3) Look for answers to your question, 4) Consider the author/site credibility, 5) Consider the site's purpose and potential biases, and 6) Check the date to ensure timeliness for the topic. The model aims to help users assess a site's trustworthiness, usefulness, and whether it provides accurate and up-to-date information to answer their question.

Uploaded by

Vignana Deepthi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

The elements of e-commerce: Internet e-commerce security

Security is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith
in e-business if its security is compromised. Following are the essential requirements for safe e-payments/transactions.
Availability:
Availability is referring to the ability to access information or resources in a specified location and in the correct
format. When a system is regularly not functioning, information and data availability is compromised and it will affect the
users. Besides functionality, another factor that effects availability is time. If a computer system cannot deliver
information efficiently, then availability is compromised again.
Utility:
Utility refers to something that is useful or designed for use. Normally, utility is not considered a pillar in
information security. To preserve utility of information, we should require mandatory backup copies of all critical
information and should control the use of protective mechanisms such as cryptography.
Integrity:
In the context of computer systems, integrity refers to methods of ensuring that the data is real, accurate and
guarded from unauthorized user modification. Data integrity is a major information security component because users
must be able to trust information.
Untrusted data compromises integrity. Stored data must remain unchanged within a computer system, as well as
during transport. It is important to implement data integrity verification mechanisms such as checksums and data
comparison.
Authenticity:
Regarding computer systems, authenticity or authentication refers to a process that ensures and confirms the
user’s identity. The process begins when the user tries to access data or information. The user must prove access rights
and identity. Commonly, usernames and passwords are used for this process. However, this type of authentication can be
overcome by hackers. A better form of authentication is biometrics, because it depends on the user’s presence and
biological features.
Confidentiality:
Confidentiality means allowing authorized users to access sensitive and protected information. Sensitive
information and data should be disclosed to authorized users only. The user must obtain certain clearance level to access
specific data or information. Confidentiality can be ensured by using role-based security methods to ensure user or viewer
authorization (for example, define user to read but not write data).
Nonrepudiation:
Nonrepudiation refers to a method of guaranteeing message transmission between parties using digital signature
and/or encryption. Proof of authentic data and data origination can be obtained by using a data hash, but the method is not
100 percent effective. Nonrepudiation can be achieved by using digital signatures to prove the delivery and receipt of
messages.

A web site Evaluation Model


1) Open the site:
The first thing we need to do is open the site. When looking through your Google search results, It is good to see
the anatomy of a Google Search result and the benefits of looking past the first few results.
2) Skim read:
1
Skim read means we determine whether we can read and understand the text. If it’s too complicated or difficult to
understand, then find another website.
Decide whether this site provide the information that we are looking for. If the site is difficult to navigate,
cluttered with ads, or has other red flags like poor spelling or inappropriate content then we might want to leave straight
away.
3) Look for the answer to your question:
If the site might prove useful, we now need to find out if the information on the site actually answers our
question. We could use a search box, navigation menu, or pull up your own search box by pressing Control/Command F.
Type in the keywords that we are looking for. Stop skimming, and read more closely to see if this information is useful to
you.
4) Consider the credibility of the author or website:
If the information is there, then we need to consider the credibility of the author or website. So that how far we
can you rely on the information
Here are some things that we can look for on the website:
Domain — sometimes domains that include .gov or .edu come from more trustworthy education or government sources.
Author information — look at at the author bio or About page.
Design — we can’t judge a book (or website!) by its cover but sites that are cluttered, difficult to navigate, or look
amateurish may be worth avoiding.
Sources — trustworthy articles usually link to other sources or cite where their facts come from.
5) Consider the purpose of the site:
The next step is to think about the purpose of the site and whether it meets our needs.
 Is the author trying to make you think a certain way? Are they biased or one-sided?
 Are they trying to sell us something? Sometimes ads might not be so obvious, for example, blog posts can be
written to promote a product.
 Is the author’s tone calm and balanced? Articles fuelled by anger or extreme opinions are not going to be the best
source of information.
 Do the headlines match the article? Or are they simply designed to hook readers?
 Is the author trying to educate the audience and present a balanced and factual picture? This is what we usually
want.

6) Look for the date:


Finally, it’s important to consider whether the information is current enough for our topic. We can look for when
the article was written or it might tell you when it was last updated. Sometimes URLs include dates as well.
Does it matter how old an article is? Well, that might depend on our topic. For example, if we are looking for the
latest research on nutrition or a medical condition, the date might be very important. If we are looking for some facts
about World War One, it might not matter if the information hasn’t been updated in a few years.

You might also like