Sie sind auf Seite 1von 15

IMPLEMENTING ENCRYPTION IN A WEB-BASED E-COMMERCE SYSTEM.

(A CASE STUDY OF LAKE JIPE SAFARI CAMP RESTAURANT)

ALUOCH J. MGHENJA
BIT-001-1611/2014
1.1 Background information

• Web based e-commerce systems have been developed in recent times for
the purpose of facilitating business operations.
• Systems have been found to have some inadequacies and limitations in
terms of functionality and performance. These are largely due to some
attendant problems such as insecurity of the system as well as the
weakness of the system which often times may not be sufficiently robust to
withstand the attendant problems (Omondi and Mbugua, 2017).
• In today’s age of fast food and take-out, many restaurants have chosen to
focus on quick preparation and speedy delivery of orders rather than
offering a rich dining experience.
1.2 Research area

Computer security is the protection of information systems from theft or


damage to the hardware, the software, and to the information on them,
as well as from disruption or misdirection of the services they provide
(Okwum et al, 2017).

It includes controlling physical access to the hardware, as well as


protecting against harm that may come via network access, data and
code injection, and due to malpractice by operators, whether
intentional, accidental, or due to them being tricked into deviating from
secure procedures.
1.3 Problem statement

The challenges encountered by the existing system at Lake Jipe Safari Camp
Restaurant which is based on phone calls and physical visitations to the restaurant
to order food or drink(s) serve as a major drawback to the realization of efficiency
and customer satisfaction. The experience of ordering is not pleasant for the
customers. Customers will have to make long queues before placing their orders
especially during peak hours and then the ordering staff will record customer
orders.
The other problem with the current system is that the customers are not
able to see the ingredients of the meals before they place their order and
also they only have to pay for an order either in cash or via Mpesa which is
greatly affected by the poor network coverage in the area.
1.4 Proposed Solution
The proposed solution is well-encrypted online ordering system, which is a
technique of ordering foods online applicable in any food industry(Templin and
Shearer, 2017. ). This main advantage of this system is that it greatly simplifies the
ordering process for both the customer and the restaurant while ensuring integrity,
confidentiality and availability of the required information. When the customer
visits the ordering webpage, they will be presented with an interactive and up-to-
date menu, complete with all available options and dynamically adjusting prices
based on the selected options. After making a selection, the item is then added to
their order, which the customer can review the details of at any time before
checking out. This provides instant visual confirmation of what was selected and
ensures that items in the order are, in fact, what was intended.
1.5 Objectives

General objectives
To develop a secure web-based system that will improve service delivery in
fast food restaurants and offer secure handling of information.
Specific objectives
• To develop a secure system that will enable customers to order custom
meals that aren’t in the menu.
• To develop a secure system that will enable customers to have a visual
confirmation that the order was placed correctly.
• To develop a system that will enable customers to know food ingredients
before ordering.
• To reduce restaurant’s food wastage.
• To develop a system that will ensure correct placement of orders through
visual confirmation
1.6 Research questions

• What are the security challenges faced by e-commerce systems in the


fast food industry?
• 1.6.2 How can encryption mitigate the security challenges in the fast food
restaurant?
• 1.6.3 How feasible is the proposed solution given the available
technological constraints in the fast food industry?
• 1.6.4 How is an improved security going to impact the industry?
• 1.6.5 How efficient will the restaurant be with an online food ordering
system?
Justification

• Higher Employee Productivity.


• Order Accuracy
• Growing the Business.
• Ability to Build a Database
• Powerful Analytics
• Project scope
Limitations of the system

1. Requires internet connection and also the user must be computer literate.
2. Customers targeted are adults with access
to computer systems while the minors might have to go physically to the restaurant
to purchase the food that they want or order food the food with the help of an adult.
3. The other limitation is that the system will only be convenient to people with a small
geographical region, basically just around the restaurant i.e. can only help a

small area.
Methodology

• This project intends to use agile software


development because of its early and
predictable delivery since time is limited. To be
more specific, this project will use Rational
Unified Process (RUP) will be used to
undertake the project. This methodology is
based on an object oriented system analysis
and design.
System requirements

Software requirements: Hardware requirements:


• Operating system: windows 7 • Processor Speed:1.7GHZ or above
• Technology : PHP • RAM: 4 GB RAM or above
• Database : MySQL • Hard Disk: 500 GB hard disk or above
• Tool : Dreamweaver • Printer for printing reports
• Antivirus software • Uninterruptible power supply to ensure a
• Backup & Data Recovery software constant access of data.
• USB flash disk( At least 4GB)
• Intel corei3 processor.
Budget
ITEM DESCRIPTION AMOUNT (KSH)

XAMPP SOFTWARE FREE

DREAMWEAVER FREE

LAPTOP/ DESKTOP 30000

PRINTER 23000

UPS 16000

FLASH DISK 800

MISCELLANEOUS COST 4000

HOSTING CHARGES 1000 per year

TOTAL: 74,800
Work plan
Task Duration Proposed Actual Proposed Actual End Deliverables
in weeks Start Date Start Date End Date Date

Proposal 3 weeks 20/10/2018 18/10/2018 5/11/2018 10/11/2018 Proposal


Writing document
Feasibility 3 weeks 10/11/2018 26/11/2018 Literature
Study review
Analysis 4 weeks 30/11/2018 29/12/2018 Analysis
Document
Design 4 week 1/1/2019 29/1/2019 Design
Document
Coding 10weeks 30/1/2019 1/4/2019
Testing 9 weeks 7/2/2018 7/4/2019 Prototype
Installation and 1 week 8/4/2019 15/4/2018 Working
implementation Prototype
Documentation 28 weeks 15/10/2018 15/4/2018 Complete
System
Gantt Chart
1.12.2 Gantt Chart

Weeks/Ac 1 1 1 1
1 2 3 4 5 6 7 8 9 11 12 14 17 18 19 20 21 22 23 24 25 26 27 28
tivity 0 3 5 6

Project
Proposal

Feasibilit
y Study

Analysis

Design

Coding

Testing

Documen
tation
The End
Thank you

Das könnte Ihnen auch gefallen