E-commerce Code:  22.628    :  6
View general information   Description   Prior knowledge   Information prior to enrolment   Learning objectives and results   Content   View the UOC learning resources used in the subject   Guidelines on assessment at the UOC   View the assessment model  
This is the course plan for the second semester of the academic year 2023/2024. To check whether the course is being run this semester, go to the Virtual Campus section More UOC / The University / Programmes of study section on Campus. Once teaching starts, you'll be able to find it in the classroom. The course plan may be subject to change.
This course on e-commerce teaches a discipline that was born thanks to the development of general-purpose communication networks: the Internet. To study the technology associated with e-commerce, we will work on three main areas:

Firstly, databases. In e-commerce systems, the correct design and management of databases is extremely important, since one of the main characteristics of digital businesses is its high degree of automation. Databases play a key role in the management of information and automation of all kind of processes: purchases, sales, orders, stock management, etc.

Another important part of an e-commerce is the payment system. It is well known that the internet can be an insecure channel for exchanging information and conducting transactions. Therefore, implementing the right payment system and using proper cryptographic mechanisms to protect information is of utmost importance.

Finally, there is a part related to digital contents that is often overlooked, perhaps because it is something that rarely causes problems to final users, or rather, it is perceived as something positive: the fact that digital products and contents can be easily copied with perfect accuracy as many times as necessary. This makes piracy an inherent problem of our digital age. This issue, which often hinders the digitally-enabled sale or distribution of products, is currently generating significant research efforts. The present course will also cover this problem, and we will see different strategies for tackling piracy, along with their strengths and limitations.

Amunt

You must have passed the “Introduction to Databases” course before you take this course.

Amunt

You must have passed the “Introduction to Databases” course before you take this course.

Amunt

The competences developed in this course are the following:

  • Evaluate software solutions and draw up proposals for development projects, taking into account the resources, the available alternatives and the market conditions.
  • Understand the fundamentals of operating systems and computer networks so as to design and develop solutions that take into account each platform's specific features, available and shared resources, and the system's security.
  • Apply specific data processing, storage and administration techniques.
  • Propose and evaluate different technological alternatives for solving a specific software development problem.

From the above competences, this course focuses on  the following learning outcomes:

  • Identify the different systems that make up an e-commerce architecture as well as the different e-commerce alternatives, depending on the participants.
  • Apply the concepts of information security and the techniques available to protect systems in the different areas of e-commerce.
  • Understand the importance of databases as a repository of all the information that a company manages in the e-commerce environment.
  • Identify the two main types of information used in e-commerce applications: the one that refers to the company's sales operations and the one that is useful for decision-making.
  • Differentiate the existing electronic payment systems and recognize what their most important properties are.
  • Apply techniques for the protection of the copyright of electronic products.

Amunt

Module 1 - Introduction to electronic commerce
  • Basic concepts and e-commerce terminology.
  • The EDI standards.
  • Legal aspects of e-commerce.

Module 2 - Security in electronic commerce
  • Basic concepts of cryptography and information security.
  • Public key cryptography.
  • Security in e-commerce: data, payments and sales.

Module 3 - Information Management
  • Database structure for an e-commerce.
  • E-commerce data analysis.

Module 4 - Electronic payment systems
  • Credit card payments
  • E-wallet systems
  • SMS payments
  • Digital currency

Module 5 - Electronic copyright protection systems
  • Copyright protection of digital content.
  • Image watermarking
  • Video watermarking

Project 1 - Virtual store with basic web technology

Project 2 - Virtual store with Prestashop

Amunt

Amunt

The assessment process is based on the student's personal work and presupposes authenticity of authorship and originality of the exercises completed.

Lack of authenticity of authorship or originality of assessment tests, copying or plagiarism, the fraudulent attempt to obtain a better academic result, collusion to copy or concealing or abetting copying, use of unauthorized material or devices during assessment, inter alia, are offences that may lead to serious academic or other sanctions.

Firstly, you will fail the course (D/0) if you commit any of these offences when completing activities defined as assessable in the course plan, including the final tests. Offences considered to be misconduct include, among others, the use of unauthorized material or devices during the tests, such as social media or internet search engines, or the copying of text from external sources (internet, class notes, books, articles, other students' essays or tests, etc.) without including the corresponding reference.

And secondly, the UOC's academic regulations state that any misconduct during assessment, in addition to leading to the student failing the course, may also lead to disciplinary procedures and sanctions.

The UOC reserves the right to request that students identify themselves and/or provide evidence of the authorship of their work, throughout the assessment process, and by the means the UOC specifies (synchronous or asynchronous). For this purpose, the UOC may require students to use a microphone, webcam or other devices during the assessment process, and to make sure that they are working correctly.

The checking of students' knowledge to verify authorship of their work will under no circumstances constitute a second assessment.

Amunt

You can only pass the course if you participate in and pass the continuous assessment. Your final mark for the course will be the mark you received in the continuous assessment.

 

Amunt