Explain the concept of task analysis with reference to a customer placing an order
online.
4
Explain the stages involved in use- case analysis with reference to a customer
e-procurement system.
6
Outline the different types of services that need to be provided by different servers
How do the attributes of a secure e-commerce site differ from customer and com-
e-commerce site.
594
Part 3 Implementation
Davenport, T.H. (1993) Process Innovation: Re‑engineering Work through Information
Technology. Harvard Business School Press, Boston.
de Chernatony, L. (2001) Succeeding with brands on the Internet. Journal of Brand
Management, 8(3), 186– 95.
DTI (2006) Identity access and E-mail and Web Usage factsheets. A survey of UK business
practice, managed by PricewaterhouseCoopers on behalf of the Department of Trade and
Industry (DTI). Published at DTI Information Security Breaches Survey.
Eaton, C., Deroos, D., Deutsch, T., Lapis, G. and Zikopoulos, P. (2012). Understanding
Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. McGraw Hill,
New York.
E-consultancy (2007) Digital business briefing interview. Bruce Tognazzini on human–
computer interaction. Interview published November:
www.econsultancy.com/news-
blog/newsletter/link_track.asp?id=3515&link_id=#1
(no longer available).
E-consultancy (2009) Q& A: Hiscox’s Mike Beddington on selling financial services online,
Posted 16 July 2009:
http://econsultancy.com/blog/4227-q-a-hiscox-on-selling-
financial-services-online
.
Fogg, B. (2009) In Proceedings of the 4th International Conference on Persuasive Technology
(2009), pp. 1–7. Available from
www.behaviormodel.org
.
Fogg, B., Soohoo, C., Danielson, D., Marable, L., Stanford, J. and Tauber, E. (2003) How do
people evaluate a web site’s credibility? A Consumer WebWatch research report, pre-
pared by Stanford Persuasive Technology Lab.
Forrester (2005) Site Design Personas: How Many, How Much. By Harley Manning, 3 June.
Forrester Research publication.
Forrester (2011) The Forrester Wave
™
: Web Content Management For Online Customer
Experience, Q3 2011. Research report by Stephen Powers. Summarised at:
http://
blogs.perficient.com/portals/2011/07/20/ forrester-releases-new-wcm-wave-and-
welcome-to-a-new-acronym
.
Georgakoupoulos, D., Hornick, M. and Sheth, A. (1995) An overview of workflow manage-
ment: from process modeling to workflow automation infrastructure.
Distributed and
Parallel Databases, 3, 119– 53.
Guardian (2003) Hijacked your bank balance, your identity, your life.
The Guardian,
25 October).
Guardian (2103) Financial Times: There is no drawback to working in HTML5. Interview
with Stuart Dredge, The Guardian, 29 April.
Hofacker, C. (2001) Internet Marketing. John Wiley & Sons, New York.
Hoffman, D.L. and Novak, T.P. (1997) A new marketing paradigm for electronic com-
merce. The Information Society, Special issue on electronic commerce, 13 (January–
March), 43– 54.
IBM (2013) What is Big Data? Service solutions page.
www.ibm.com/software/data/
bigdata
. Accessed 20 July 2013. No publication date (no longer available).
Jacobsen, I., Ericsson, M. and Jacobsen, A. (1994) The Object Advantage. Business Process
Re‑engineering with Object Technology. Addison- Wesley, Wokingham.
Kesh, S., Ramanujan, S. and Nerur, S. (2002) A framework for analyzing e-commerce secu-
rity. Information Management and Computer Security, 10(4), 149– 58.
Knight, K. (2011). Responsive Web Design: What It Is and How To Use It. Smashing Magazine
blog post, 12 January 2011.
http://coding.smashingmagazine.com/2011/01/12/
guidelines-for-responsive-web-design/
.
Lynch, P. and Horton, S. (1999) Web Style Guide. Basic Design Principles for Creating Web
Sites. Yale University Press, New Haven, CT. Available online at:
http://info.med.yale.
edu/caim/manual/contents.html
.
Messagelabs (2008) Threat Statistics, published monthly at
www.messagelabs.com
.
Mitnick, K. and Simon, W. (2002) The Art of Deception: Controlling the Human Element of
Security. John Wiley & Sons, New York.
M11_CHAF6542_06_SE_C11.indd 594
7/23/14 1:27 PM