|
|||||
View general information Description Prior knowledge Information prior to enrolment Learning objectives and results Content View the UOC learning resources used in the subject Guidelines on assessment at the UOC View the assessment model | |||||
This is the course plan for the second semester of the academic year 2023/2024. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change. | |||||
This course on e-commerce teaches a discipline that was born thanks to the development of general-purpose communication networks: the Internet. To study the technology associated with e-commerce, we will work on three main areas: Firstly, databases. In e-commerce systems, the correct design and management of databases is extremely important, since one of the main characteristics of digital businesses is its high degree of automation. Databases play a key role in the management of information and automation of all kind of processes: purchases, sales, orders, stock management, etc. Another important part of an e-commerce is the payment system. It is well known that the internet can be an insecure channel for exchanging information and conducting transactions. Therefore, implementing the right payment system and using proper cryptographic mechanisms to protect information is of utmost importance. Finally, there is a part related to digital contents that is often overlooked, perhaps because it is something that rarely causes problems to final users, or rather, it is perceived as something positive: the fact that digital products and contents can be easily copied with perfect accuracy as many times as necessary. This makes piracy an inherent problem of our digital age. This issue, which often hinders the digitally-enabled sale or distribution of products, is currently generating significant research efforts. The present course will also cover this problem, and we will see different strategies for tackling piracy, along with their strengths and limitations. |
|||||
You must have passed the “Introduction to Databases” course before you take this course. | |||||
You must have passed the “Introduction to Databases” course before you take this course. | |||||
The competences developed in this course are the following:
From the above competences, this course focuses on the following learning outcomes:
|
|||||
Module 1 - Introduction to electronic commerce
Module 2 - Security in electronic commerce
Module 3 - Information Management
Module 4 - Electronic payment systems
Module 5 - Electronic copyright protection systems
Project 1 - Virtual store with basic web technology Project 2 - Virtual store with Prestashop |
|||||
|
|||||
The assessment process is based on the student's personal work and presupposes authenticity of authorship and originality of the exercises completed. Lack of authenticity of authorship or originality of assessment tests, copying or plagiarism, the fraudulent attempt to obtain a better academic result, collusion to copy or concealing or abetting copying, use of unauthorized material or devices during assessment, inter alia, are offences that may lead to serious academic or other sanctions. Firstly, you will fail the course (D/0) if you commit any of these offences when completing activities defined as assessable in the course plan, including the final tests. Offences considered to be misconduct include, among others, the use of unauthorized material or devices during the tests, such as social media or internet search engines, or the copying of text from external sources (internet, class notes, books, articles, other students' essays or tests, etc.) without including the corresponding reference. And secondly, the UOC's academic regulations state that any misconduct during assessment, in addition to leading to the student failing the course, may also lead to disciplinary procedures and sanctions. The UOC reserves the right to request that students identify themselves and/or provide evidence of the authorship of their work, throughout the assessment process, and by the means the UOC specifies (synchronous or asynchronous). For this purpose, the UOC may require students to use a microphone, webcam or other devices during the assessment process, and to make sure that they are working correctly. The checking of students' knowledge to verify authorship of their work will under no circumstances constitute a second assessment. |
|||||
|