Professional Documents
Culture Documents
Chapter 3
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 1
Learning Objective 1
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
32
of information technologies in any aspect of business. Electronic Commerce (eCommerce) is defined as the use of IT in the exchange of products and services among organizations and individuals. Web Commerce involves using IT in the exchange of products and services among individuals and organizations over the Internet.
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
33
careers One fundamental change has been: The manner in which companies interact with their suppliers, customers, government agencies, and other business partners
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
over computer networks Business activities that are strong candidates for conversion to e-commerce: Paper based Time-consuming Inconvenient for customers
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
virtual supply chain to cut resupply times and reduce costs An organization will use both: Buy-side e-commerce to purchase goods and services and Sell-side e-commerce to sell products to its customers
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
directly with an organization and avoid intermediaries Disintermediation: The elimination of intermediate organizations between the producer and the consumer
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
selling directly to other consumers Popular sites: Bidzcom, Craigslist, eBid, Kijiji ePier, Ibidfree, Ubid, and Tradus Etsy is a C2C Web site that: Specializes in the buying and selling of handmade and vintage items Facilitates sales worth more than $10 million each month
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Information Systems, Tenth 2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood Edition
Learning Objective 2
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 11
joint structure and behavior of the enterprise and its information system. Objectives of an EA:
Alignment of the organizations IT planning and
strategy with companys business goals Management of risks associated with the information system Optimal use of information systems resources Flexibility to adapt to the information system to changing business models and management needs.
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 12
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 13
Enterprise Architecture
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 14
Business Architecture
Business architecture defines human
resources, processes, and infrastructure that a business needs to accomplish its business strategy.
Business architectures are described in terms of
business domains.
Business domains describe groups of business
functions, business processes, and concepts for which management may assign responsibility. Specific components of the typical business architecture:
Strategies, goals, objectives, general policies, business plan, plan of operations, organization structure Business processes, workflows, events
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 15
Data Architecture
Data architecture defines the needed data, how
it is to be stored, how it is to be processed, how it is to be utilized, and how it integrates with other main architectural domains.
The database is the primary concept in data
architecture. Data model determines how the database is structured, as well as the operations that can be performed on its data. Structured Query Language (SQL) is a technology used to define, access, and manipulate data in a relational database. The relational data model structures data in two-dimensional tables.
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 16
Data Architecture
The Corporate Information Factory
3.
Data acquisition data are acquired from various operations applications. Data management data are integrated into databases and are also transformed and stored in operational databases and data warehouses. Data delivery data are delivered to various data marts.
3 17
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Data Architecture
Operational databases store relatively current
transaction data in support of tactical decisions. Data warehouses store enormous volumes of current and historical data for use in research and analysis. Data marts contain subsets of the data contained in the operational database and data warehouse. Data mining warehouse may contain copies of subsets of the data warehouse. Online analytical processing (OLAP) involves complex analysis performed on data warehouses.
3 18
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Technical Architecture
Technical architecture describes the structure
and behavior of the IT infrastructure and defines standards, principles, procedures, and best practices to govern the IT architecture. Eight technical domains:
1. 2. 3. 4. 5. 6. 7. 8.
Applications Database Enterprise systems management Information Integration Network and telecommunications Platform Security
3 19
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Learning Objective 3
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 20
sends electronic instructions to his or her bank detailing who, when, and amount to pay. Credit and Debit Card Systems the payer transmits a credit or debit card number to a secure server.
Secure server one in which the
created when a bank attaches a digital signature to a note promising to pay the bearer some amount of money.
Digital signature is an encrypted, digested
version of a document that can be used to verify the documents authorship and authenticity.
Virtual Cash based on an electronic wallet. Electronic wallet is a computer program that keeps track of the various items of information associated with electronic money.
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 22
2.
3. 4.
Memory cards contain microchips that store information and contain hardware that provides PIN access to the cards contents. Possess weak security. Shared-key cards overcome the weakness of memory cards by using encryption for all communications between the card and cash register. Signature-transporting cards allow the user to spend digital cash. Signature-creating cards are capable of generating their own digital signatures.
3 23
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Learning Objective 4
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 25
E-Commerce Challenges
Dealing with consumer privacy concerns
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
information without your permission to commit fraud Companies must be prepared to: Make a substantial investment to safeguard their customers privacy or run the risk of losing customers
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
some consumers are not willing to purchase online Online marketers must: Create specific trust-building strategies for their Web sites by analyzing their customers, products, and services
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Cultural challenges
Language challenges Time and distance challenges Infrastructure challenges Currency challenges State, regional, and national law challenges
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Security
Methods to increase security:
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
and are owned or created by a single entity Digital rights management (DRM): The use of any of several technologies to enforce policies for controlling access to digital media such as movies, music, and software
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
Legal Jurisdiction
When conducting e-commerce, sales must not
violate county, state, or country legal jurisdictions Examples: Selling stun guns and similar devices Selling cigarettes or alcohol to underage customers
Systems, Edition 2013Information Pearson Education, Inc.Tenth Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
End of Chapter 3
Some slides from Stair, R. and Reynold,G. (2012). Information Systems (10ed). Cengage Learning.
2013 Pearson Education, Inc. Publishing as Prentice Hall, AIS, 11/e, by Bodnar/Hopwood
3 34