Course Review

1 / 43
About This Presentation
Title:

Course Review

Description:

A set of interrelated components that collect, process, store, and distribute information to ... user-specific information (preferences, electronic shopping cart, etc. ... – PowerPoint PPT presentation

Number of Views:28
Avg rating:3.0/5.0
Slides: 44
Provided by: jimha4
Learn more at: http://courses.csusm.edu

less

Transcript and Presenter's Notes

Title: Course Review


1
Course Review
  • MIS302 Spring 2006

2
Definition Information System
  • A set of interrelated components that collect,
  • process, store, and distribute information to
  • support decision making and control in an
  • organization

3
Information Technology
  • Information explosion that permeates our lives
  • Compared to student several years back
  • PC Usage at home is up
  • Migration to broadband access at home
  • Migration to eCommerce
  • Higher percentage time online
  • More diverse online applications
  • Increase in use of personal devices
  • More applications on cell phones

4
The Growth of the Information Economy 1900 - 2000
5
The Growth of the Information Economy 1950-2000
6
Emergence of the Digital Firm
  • Digitally-enabled relationships with customers,
    suppliers, and employees
  • Core business processes accomplished via digital
    networks
  • Digital management of key corporate assets
  • Rapid sensing and responding to environmental
    changes

7
The Digital Firm
  • Information technology infrastructureProvides a
    universal and easy-to-use set of technologies and
    technology standards that can be adopted by all
    organizations
  • Direct communication between trading partners
    Removes intermediate layers, streamlines process

8
The Digital Firm
  • Round-the-clock service Web sites available to
    consumers 24 hours a day
  • Extended distribution channels Outlets created
    for attracting customers who otherwise would not
    patronize
  • Reduced transaction costs Costs of searching for
    buyers, sellers, etc. reduced

9
The Digital Firm Categories of eCommerce
  • B2C Retailing of products and services directly
    to individual customers
  • B2B Sales of goods and services among businesses
  • C2C Individuals use Web for private sales or
    exchange

10
The Digital Firm B2C
  • Disintermediation The removal of organizations
    or business process layers responsible for
    certain intermediary steps in a value chain
  • Reintermediation The shifting of the
    intermediary role in a value chain to a new source

11
The Digital Firm B2C
12
Networks
  • Interconnection of devices (e.g. computers) to
    permit exchange of digital data
  • Connections between devices can be either wired
    or wireless
  • At some level, wired telephones, cell phones,
    and computers all share a common method of
    interconnection and communication...through
    networks

13
Networks
  • PBX Private Branch Exchange
  • LAN Local Area Network
  • WAN Wide Area Network

14
(No Transcript)
15
  • To send a
  • message
  • from this
  • computer

Does not require that they know about each
other or where each is located. All is needed
is an address. And there are millions of
possible paths to get from one to the other.
To this computer
16
What is Internet-connected?
  • Today
  • 400 million computers, some cell phones, many
    control devices (Tivo boxes, farmers sprinkler
    systems, Blackberrys, some cell phones and
    pagers, traffic cameras, etc.)
  • Tomorrow
  • Basically every electrical device in home and
    industry, including wall switches, fans,
    thermostats, appliances, traffic lights, etc.

17
Connecting to the Internet Dial-upe.g. through
AOL
Your computer at home
PacBell
Internet
AOL
18
(No Transcript)
19
Intranets and Extranets
  • Intranet internal network accessible only by the
    organization's members, employees, or others with
    authorization
  • Extranet business-to-business intranet that
    allows limited, controlled, secure access between
    a company's intranet and designated,
    authenticated users from remote locations

20
Internet Intranet
21
Extranet
Extending the Private Intranet out to an
authorized user external to the firewall
Authorized External user
Extranet
The external user has access as if he/she were
directly on the Intranet by the use of special
software
22
Encryption
  • The altering of data using a secret code so as to
    be unintelligible to unauthorized parties

23
Browsing securelyusing encryptionsecure http
or https
http//finance.yahoo.com
https//finance.yahoo.com
https secure http
24
Search Engines
  • Crawler type (Google, Yahoo, etc.) software
    searches the raw data (e.g. the web), build an
    index, and presents results.
  • Directory type (dmoz.org) Human editors
    search for the most relevant information and
    build a directory-style index.

25
How do (crawler-type) search engines work?
  • They search the entire Internet -- or select
    pieces of the Internet -- based on important
    words, using spiders
  • They keep an index of the words they find, and
    where they find them.
  • After the index is built, they then allow users
    to look for words or combinations of words found
    in that index.

26
eMarketings Differences
Marketings 4Ps
  • Product
  • Quality
  • Models and sizes
  • Packaging
  • Brands
  • Service
  • Price
  • Allowances and deals
  • Distribution and retailer mark-ups
  • Discount structure
  • Promotion
  • Advertising
  • Sales promotion
  • Personal selling
  • Publicity
  • Place
  • Channels of distribution
  • Outlet location
  • Sales territories
  • Warehousing system

Ability to measure Effectiveness
27
eMarketing
  • Cost per-view cost approximately equal to cost
    per-subscriber in conventional media (magazines,
    etc.)
  • Sponsored search ads and content search ads cost
    zero, sponsor pays only for click-thrus

28
How do search engines make money?
Sponsored Links
29
Recognizing return visitors
  • Cookie packet of information sent by a server to
    a browser and then sent back by the browser each
    time it accesses that specific server.
  • Cookies are used for identifying return visitors
    to a site, user tracing, and maintaining
    user-specific information (preferences,
    electronic shopping cart, etc.)
  • A cookie can't identify your name, your age, or
    where you are located

30
System vulnerabilities
  • Unauthorized access
  • Abuse (SPAM, Denial of Service attacks,
    viruses)
  • Fraud (phishing, etc.)

31
System vulnerabilities Unauthorized access
  • First step
  • authentication is the process of attempting to
    confirm that another user from whom we have
    received some communication is the claimed party
  • Second step
  • authorization is permitting resources to be used
    by those that have been granted authority

32
System vulnerabilitiesViruses
  • Viruses are rogue applications that attach
    themselves to legitimate programs and execute on
    your machine, for annoyance or, in rare cases,
    damage to your files.
  • Viruses are self-replicating/self-reproducing
    programs that spreads by inserting copies of
    itself into other programs or documents
  • Most viruses are brought in by attachments to
    email documents

33
System vulnerabilitiesfraud Phishing
  • phishing is a form of criminal activity
    characterized by attempts to fraudulently acquire
    sensitive information, such as passwords and
    account numbers, by masquerading as a trustworthy
    person or business in an apparently official
    electronic communication, such as an email.

34
Disaster recovery plan
  • Business must take extra precautions to protect
    users and data
  • Continue to run business in event of data loss,
    denial-of-service attacks, in-house viruses,
    etc.

35
Typical data backup strategy

Monday
Weekend
Tuesday
Wednesday
Weekly Full Backup
Data lost between Midnight Monday 4PM
Wednesday
Incremental
4PM CRISIS
4PM Repaired Restored
36
Solutions
  • Fault-tolerant computer systems Contain extra
    hardware, software, and power supply components
    to provide continuous uninterrupted service
  • Clustering Linking two computers together so
    that a second computer can act as a backup to the
    primary computer or speed up processing
  • Mirroring Duplicating all processes and
    transactions of server on backup server to
    prevent any interruption in service
  • Multiple network connection points

37
Privacy
  • Privacy issues have always been around, however
    the popularity of the Internet and the resulting
    distances between parties has brought renewed
    focus to privacy issues
  • FTCs Fair Information Practice Principles
  • Informed Consent Consent given with knowledge of
    all facts needed to make a rational decision
  • Most visible Privacy Risk Identity Theft

38
Classifying computers Size
  • Mainframes Largest computer, massive memory,
    rapid processing power
  • Midrange computers Less powerful, less
    expensive, and smaller than a mainframe
  • Server Provides software and other resources to
    computers over a network
  • PC (Personal Computer)

39
Selecting hardware
  • Mainframes are used where there are very large
    amounts of data that are more effectively
    processed in one place, or must be kept
    physically secure, for example
  • Personnel records of a large firm
  • DMV records
  • Bank transactions
  • Physical access to the machine is tightly
    controlled for security reasons
  • Data backup and recovery procedures are standard

40
Selecting hardware
  • PCs are used for individuals storage of local
    data, accessing network resources, etc.
  • For small companies, networked PCs offer a good
    alternative to mainframes
  • For large companies, a mixture of mainframes and
    networked PCs is common

41
All numbers shown are approximate for comparison
purposes
Computer HardwareCore Components
CentralProcessingUnit(CPU)
1 gigahertz 1 nanosecond 1,000,000X speed
100 megahertz 10 nanoseconds 100,000X speed
Cache memory
computer bus
Memory
Primary Storage 10 megahertz 100
nanoseconds 10,000X speed
Secondary Storage 1 kilohertz 1 millisecond 1X
speed
Hard drive
42
The trilogy Hardware, software, and data
Jim.doc
MS Word
data
software
hardware
Your PC
43
Types of software
  • Application software Programs written to perform
    functions specified by end users (e.g. browser,
    word processing, spreadsheet, database, etc.)
  • Operating System software Manages computers
    resources (e.g. Windows XP, Apple OSX, Linux,
    etc.)
Write a Comment
User Comments (0)