Title: Course Review
1Course Review
2Definition Information System
- A set of interrelated components that collect,
- process, store, and distribute information to
- support decision making and control in an
- organization
3Information Technology
- Information explosion that permeates our lives
- Compared to student several years back
- PC Usage at home is up
- Migration to broadband access at home
- Migration to eCommerce
- Higher percentage time online
- More diverse online applications
- Increase in use of personal devices
- More applications on cell phones
4The Growth of the Information Economy 1900 - 2000
5The Growth of the Information Economy 1950-2000
6Emergence of the Digital Firm
- Digitally-enabled relationships with customers,
suppliers, and employees - Core business processes accomplished via digital
networks - Digital management of key corporate assets
- Rapid sensing and responding to environmental
changes
7The Digital Firm
- Information technology infrastructureProvides a
universal and easy-to-use set of technologies and
technology standards that can be adopted by all
organizations - Direct communication between trading partners
Removes intermediate layers, streamlines process
8The Digital Firm
- Round-the-clock service Web sites available to
consumers 24 hours a day - Extended distribution channels Outlets created
for attracting customers who otherwise would not
patronize - Reduced transaction costs Costs of searching for
buyers, sellers, etc. reduced
9The Digital Firm Categories of eCommerce
- B2C Retailing of products and services directly
to individual customers - B2B Sales of goods and services among businesses
- C2C Individuals use Web for private sales or
exchange
10The Digital Firm B2C
- Disintermediation The removal of organizations
or business process layers responsible for
certain intermediary steps in a value chain - Reintermediation The shifting of the
intermediary role in a value chain to a new source
11The Digital Firm B2C
12Networks
- Interconnection of devices (e.g. computers) to
permit exchange of digital data - Connections between devices can be either wired
or wireless - At some level, wired telephones, cell phones,
and computers all share a common method of
interconnection and communication...through
networks
13Networks
- PBX Private Branch Exchange
- LAN Local Area Network
- WAN Wide Area Network
14(No Transcript)
15- To send a
- message
- from this
- computer
Does not require that they know about each
other or where each is located. All is needed
is an address. And there are millions of
possible paths to get from one to the other.
To this computer
16What is Internet-connected?
- Today
- 400 million computers, some cell phones, many
control devices (Tivo boxes, farmers sprinkler
systems, Blackberrys, some cell phones and
pagers, traffic cameras, etc.) - Tomorrow
- Basically every electrical device in home and
industry, including wall switches, fans,
thermostats, appliances, traffic lights, etc.
17Connecting to the Internet Dial-upe.g. through
AOL
Your computer at home
PacBell
Internet
AOL
18(No Transcript)
19Intranets and Extranets
- Intranet internal network accessible only by the
organization's members, employees, or others with
authorization - Extranet business-to-business intranet that
allows limited, controlled, secure access between
a company's intranet and designated,
authenticated users from remote locations
20 Internet Intranet
21Extranet
Extending the Private Intranet out to an
authorized user external to the firewall
Authorized External user
Extranet
The external user has access as if he/she were
directly on the Intranet by the use of special
software
22Encryption
- The altering of data using a secret code so as to
be unintelligible to unauthorized parties
23Browsing securelyusing encryptionsecure http
or https
http//finance.yahoo.com
https//finance.yahoo.com
https secure http
24Search Engines
- Crawler type (Google, Yahoo, etc.) software
searches the raw data (e.g. the web), build an
index, and presents results. - Directory type (dmoz.org) Human editors
search for the most relevant information and
build a directory-style index.
25How do (crawler-type) search engines work?
- They search the entire Internet -- or select
pieces of the Internet -- based on important
words, using spiders - They keep an index of the words they find, and
where they find them. - After the index is built, they then allow users
to look for words or combinations of words found
in that index.
26eMarketings Differences
Marketings 4Ps
- Product
- Quality
- Models and sizes
- Packaging
- Brands
- Service
- Price
- Allowances and deals
- Distribution and retailer mark-ups
- Discount structure
- Promotion
- Advertising
- Sales promotion
- Personal selling
- Publicity
- Place
- Channels of distribution
- Outlet location
- Sales territories
- Warehousing system
Ability to measure Effectiveness
27eMarketing
- Cost per-view cost approximately equal to cost
per-subscriber in conventional media (magazines,
etc.) - Sponsored search ads and content search ads cost
zero, sponsor pays only for click-thrus
28How do search engines make money?
Sponsored Links
29Recognizing return visitors
- Cookie packet of information sent by a server to
a browser and then sent back by the browser each
time it accesses that specific server. - Cookies are used for identifying return visitors
to a site, user tracing, and maintaining
user-specific information (preferences,
electronic shopping cart, etc.) - A cookie can't identify your name, your age, or
where you are located
30System vulnerabilities
- Unauthorized access
- Abuse (SPAM, Denial of Service attacks,
viruses) - Fraud (phishing, etc.)
31System vulnerabilities Unauthorized access
- First step
- authentication is the process of attempting to
confirm that another user from whom we have
received some communication is the claimed party - Second step
- authorization is permitting resources to be used
by those that have been granted authority
32System vulnerabilitiesViruses
- Viruses are rogue applications that attach
themselves to legitimate programs and execute on
your machine, for annoyance or, in rare cases,
damage to your files. - Viruses are self-replicating/self-reproducing
programs that spreads by inserting copies of
itself into other programs or documents - Most viruses are brought in by attachments to
email documents
33System vulnerabilitiesfraud Phishing
- phishing is a form of criminal activity
characterized by attempts to fraudulently acquire
sensitive information, such as passwords and
account numbers, by masquerading as a trustworthy
person or business in an apparently official
electronic communication, such as an email.
34Disaster recovery plan
- Business must take extra precautions to protect
users and data - Continue to run business in event of data loss,
denial-of-service attacks, in-house viruses,
etc.
35Typical data backup strategy
Monday
Weekend
Tuesday
Wednesday
Weekly Full Backup
Data lost between Midnight Monday 4PM
Wednesday
Incremental
4PM CRISIS
4PM Repaired Restored
36Solutions
- Fault-tolerant computer systems Contain extra
hardware, software, and power supply components
to provide continuous uninterrupted service - Clustering Linking two computers together so
that a second computer can act as a backup to the
primary computer or speed up processing - Mirroring Duplicating all processes and
transactions of server on backup server to
prevent any interruption in service - Multiple network connection points
37Privacy
- Privacy issues have always been around, however
the popularity of the Internet and the resulting
distances between parties has brought renewed
focus to privacy issues - FTCs Fair Information Practice Principles
- Informed Consent Consent given with knowledge of
all facts needed to make a rational decision - Most visible Privacy Risk Identity Theft
38Classifying computers Size
- Mainframes Largest computer, massive memory,
rapid processing power - Midrange computers Less powerful, less
expensive, and smaller than a mainframe - Server Provides software and other resources to
computers over a network - PC (Personal Computer)
39Selecting hardware
- Mainframes are used where there are very large
amounts of data that are more effectively
processed in one place, or must be kept
physically secure, for example - Personnel records of a large firm
- DMV records
- Bank transactions
- Physical access to the machine is tightly
controlled for security reasons - Data backup and recovery procedures are standard
40Selecting hardware
- PCs are used for individuals storage of local
data, accessing network resources, etc. - For small companies, networked PCs offer a good
alternative to mainframes - For large companies, a mixture of mainframes and
networked PCs is common
41All numbers shown are approximate for comparison
purposes
Computer HardwareCore Components
CentralProcessingUnit(CPU)
1 gigahertz 1 nanosecond 1,000,000X speed
100 megahertz 10 nanoseconds 100,000X speed
Cache memory
computer bus
Memory
Primary Storage 10 megahertz 100
nanoseconds 10,000X speed
Secondary Storage 1 kilohertz 1 millisecond 1X
speed
Hard drive
42The trilogy Hardware, software, and data
Jim.doc
MS Word
data
software
hardware
Your PC
43Types of software
- Application software Programs written to perform
functions specified by end users (e.g. browser,
word processing, spreadsheet, database, etc.) - Operating System software Manages computers
resources (e.g. Windows XP, Apple OSX, Linux,
etc.)