Beruflich Dokumente
Kultur Dokumente
E-Commerce
Electronic processing and transmission of business data
INTERNET TECHNOLOGIES
Packet Switching
messages are divided into small packets
each packet of the message takes different routes
Intranet
Systems of computers that connect internal users of org, distributed over a wide geographic area
Extranets
a password controlled network for private users
Internet Addresses
- e-mail address (for each user)
- URL address (for each web page)
- IP address (for each computer)
Protocol
a standard set of rules that allow devices to communicate with each other; governs the design of hardware and software
Functions:
- Physical connection of devices
- Synchronize transfer of data → defining the rules in initiating a message
- Basis for checking network performance → compares measured results against expectations
- Compatibility of network devices → conforming to a mutually acceptable mode of operation
- Promote flexible network designs → users are free to change and enhance their systems
TYPES OF PROTOCOLS
Transfer Control Protocol/Internet Protocol (TCP/IP)
Basic protocol that controls how individual packets of data are formatted, transmitted, and received
Permits communication between internet sites; reliable because delivery is guaranteed
HTML vs XML
- Cannot process HTML because only limited to the format/display of
the web page
- Can process XML into any other language
E commerce Greatest Benefit: ability to forge dynamic business alliances with other orgs to fill a unique market niche; more
business partnerships; forming a DYNAMIC VIRTUAL ORGANIZATION
Areas of Concern
● Data Security: data protected?
● Business Policies: policies publicly stated and followed?
● Privacy: confidential?
● Business Process Integrity: accurate, complete, and consistent info?
Decoding
Only one or few people have the private key to decode.
Digital Authentication
prove or confirm the info or message sent. NOT same as authorization
● Digital Signature: prove that original sender’s message is not tampered with
● Digital Certificate: identify and verify user sending a message is who he or she claims to be, and provide the receiver with
the means to encode a reply, used in conjunction with a public key encryption
○ trusted third parties known as certification authorities (Cas) issue digital certs
○ public key infrastructure (PKIs) contains policies and procedures for digital certification
Firewalls:
System used to insulate an org’s intranet from the internet
Can be used to authenticate an outside user of the network, verify his/her level of access authority and direct the user to the
program, data or service requested.
SOFTWARE and HARDWARE network security or control gateway, that channels all incoming and outgoing connections based on
predetermined security rules.
• Network Level Firewall → provides basic screening of low security messages and routes them to their destination
• Application Level Firewall → high level of network security
Seals of Assurance
Shows that biz website is trusted, provided by third parties
Examples: BBB, TRUSTe, Veri-Sign, Inc, ICSA AICPA/CICA WebTrust, and AICPA/CICA SysTrust
Server
Store the application program, operating system
WAN
Covers Greater geographic area than a LAN.
Is kinda like multiple LANS combined together, therefore:
● Bridges to connect same type LANS
● Gateways to connect diff LANS
***WANs May use carriers facilities like telephone lines or Value Added Network (VAN)
STAR TOPOLOGY:
Large central computer is known as HOST, and the other smaller connected
computers are nodes
Controlled by host computer or server
• Often used for a WAN; computer is a mainframe
• popular for mainframe computing
• All communications Have to go through the host, except for local
computing
• Primary communication is between central site and node
HIERARCHICAL TOPOLOGY
Host computer connected to several levels of subordinate computers.
- Master-slave relationship: only one master (host).
- Local level (slave)—> regional level (slave) —> corporate level (master)
RING TOPOLOGY:
equal lahat, so no more central computer.
- responsibility is equally distributed
- central site is eliminated
- may be used for LAN and WAN
- peer-to-peer arrangement (equal lahat)
- Common resources shared by nodes can be managed by a file server that is a
node
BUS TOPOLOGY:
All the nodes are connected to a COMMON CABLE (think body of the bus
and computers are wheels).
The server is the front of bus (the one with the engine)
• MOST POPULAR for LANs
• Simple, reliable and generally less costly to install than the ring
topology
NETWORK CONTROL
Data Collision
When two or more signals is transmitted simultaneously, it destroys both messages.
Token Passing
Involves transmitting a special signal (token) around the network form node to node in a specific sequence
Each node receives the token, regenerates it and passes it to the next node
Only the node possessing the token is allowed to transmit data
• Can be used in ring or bus topologies
Carrier Sensing
random access techniques that detect collisions when the occur; found on Ethernet
- Collision: When a node thinks there is no transmission and proceeds to transmit simultaneously with others
- Though collisions can still occur
- Used with bus topology
Systems Strategy
First step is to develop a systems strategy
Understand business needs by analyzing vision and mission and an analysis of market
Project Initiation
Process where system proposals are assessed for consistency with plan, and is evaluated in terms of feasibility and cost-
benefit
In House Development
For unique info na makukuha lang through internal development of system
Commercial Packages
When nature of the project and needs of the user permit, most orgs prefer a commercial package
Participants in SDLC:
● Systems Professionals: gather facts, analyze problems in current systems and formulate solutions
○ systems analysts, systems designers, programmers
○ product: a new system
● End Users: primary users of the system, addressing their needs is critical to success; for whom the system is built
● Stakeholders: individuals who have an interest in the system but are not end users eg employees, suppliers
Systems Strategy
Objective: link individual system projects to strategic objectives of the firm
Establish a systems steering committee
Systems Steering Committee
involves CEO, CFO, CIO, internal auditors, senior management from user areas and computer services
Typical responsibilities:
- provide guidance
- resolve conflicts
- review projects and assigning priorities
- budget and allocate funds
- review the status of projects
- determine whether projects should be continued
In summary: they just review, resolve, budget
Legacy Systems
existing applications, databases and processes are considered legacy systems which should be altered to current business processes
Architecture Description → formal description of an IS, organized in a way that identifies properties and components of IS.
Recognizing problem
need for new, improved system is manifested through various symptoms.
- Symptoms may seem vague and innocuous or go unrecognized initially.
The point at which the problem is recognized is often a reflection or function of management’s philosophy.
● reactive management - responds to problems only when they reach a crisis (solution)
● proactive management - alert to subtle signs of problems and aggressively looks for ways to improve (prevention)
The next three stages of the end user feedback process involve this interactive process.
OVERVIEW OF PHASE 2: PROJECT INITIATION (deciding on the proposals and method of implementation based on feasibility and
cost-benefit)
A. assess systems proposals for consistency with the strategic systems plan
B. evaluate feasibility and cost-benefit characteristics of proposals
C. consider alternative conceptual designs
D. select a design to enter the construct phase of the SDLC
E. examine whether the proposal will require in-house development, a commercial package, or both
Systems Analysis
A business problem must be fully understood before a solution can be formulated.
A defective analysis will lead to a defective solution.
System analysis is a two-step process : survey of current systems & analysis of users’ needs
Identify Costs:
Either one-time cost or recurring
ONE TIME COSTS
• Hardware acquisition
• Site preparation
• Software acquisition
• Systems design
• Programming and testing
• Data conversion
• Training
RECURRING COSTS
• Hardware maintenance
• Software maintenance
• Insurance
• Supplies
• Personnel
Identify Benefits
TANGIBLE BENEFITS: Reduced cost and Increased revenues; can be measured and expressed in financial terms
INTANGIBLE Benefits—increased customer/employee satisfaction, improved decision making, operational flexibility, increased
efficiency
Announcing the New System Project… can be the most delicate aspect of the SDLC.
**End user support is critical to success.
All end users need to understand the objectives of the new system.
End users and managers who view the new system as a potential benefit to their jobs, rather than a threat, are more likely to
cooperate with the project.