Presentation is loading. Please wait.

Presentation is loading. Please wait.

Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon.

Similar presentations


Presentation on theme: "Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon."— Presentation transcript:

1 Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon

2 Slide 3-2 "Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein."

3 Slide 3-3 Chapter 3 Major Topics ä Electronic data interchange ä Introduction to the Internet ä Business examples of Internet electronic commerce ä Security issues of Internet electronic commerce ä Expected growth of Internet electronic commerce ä Additional Internet technologies

4 Slide 3-4 Electronic Commerce (E-Commerce) Overview ä Also called e-business ä Refers to commercial transactions in electronic form

5 Slide 3-5 Communications Software ä Manages transmission of data between computers (provides appropriate instructions to hardware) ä Used to transfer files and to send messages (electronic mail) ä Available with some operating systems, as well as with some related hardware such as a modem, or as a separate purchase

6 Slide 3-6 Electronic Data Interchange (EDI) ä Has been in use for several decades (longer than business uses of the Internet have existed) ä Purpose/use is to send data over communication lines as secure, direct links between organizations

7 Slide 3-7 Internet Introduction ä Internet: international network of networks ä Overall cost of communication is considered low, but some parts of the world lack the needed technology ä TCP/IP: set of protocols (rules) used for Internet transmissions ä Security of messages and data continues to be a concern

8 Slide 3-8 Internet Access ä ISP: Internet Service Provider, such as AOL ä Domain: Type of organization providing access, such as.com (commercial) or.edu (educational) ä Email address pattern: username@host.domain ä example: johndoe@aol.com ä example: janedoe@memphis.edu

9 Slide 3-9 World Wide Web (WWW or “Web”) ä Designed in 1989 to help researchers to collaborate over the Internet ä Hypertext: links that can take the user directly to other data stored locally or externally ä Hypermedia: use of nontext media, such as images, sound, animation

10 Slide 3-10 World Wide Web, continued ä HTML: Hypertext markup language, the basic code used developing for Web pages ä HTTP: Hypertext transfer protocol, rules for distributing or transmitting hypertext files (Web pages) ä Browser: software (e.g., Netscape, Internet Explorer) used to retrieve HTML documents and display them on a computer screen; has capability of interpreting code and handling hyperlinks

11 Slide 3-11 Management Concerns - World Wide Web ä Is developing and maintaining a home page worth the time and expense involved to the organization? ä Can business transactions be processed safely? ä Is employee access to the Web worth the expense? If so, which employees need access? Should access be restricted or monitored?

12 Slide 3-12 Security Issues of E-Commerce ä Digital certificates: used for identification and for exchanging with another party for security of transactions ä Both public and private certificates are available. Public may be used for identification as a customer purchasing products online. Private is often used when access is limited to specified persons, who can be provided with the private certificates. A combination of both types may be used for additional security.

13 Slide 3-13 Electronic Mail (email) ä Email: sending and receiving messages by computer system; very widely used in businesses and homes ä Electronic eavesdropping: reading and perhaps storing (without permission) messages sent to someone else ä Emoticon (emotional icon): used to indicate intended feelings, e.g., :-) = smile to indicate intended humor

14 Slide 3-14 Electronic Mail ä An advantage: ä Messages can be sent and responses received very quickly. ä A disadvantage: ä Confidentiality is not ensured: for example, a message intended to be private could be forwarded to 1000 additional persons.

15 Slide 3-15 Electronic Mail Emoticons ä How would you interpret these emoticons if seen in a message you received? ä :-K:-@ ä :’-(*:O) ä C=:-):-I ä :-\‘:-)

16 Slide 3-16 Electronic Mail Emoticons ä Typical intended meanings of certain emoticons: ä :-K beats me:-@ screaming ä :’-(crying*:O) clowning ä C=:-)cooking:-I Hmmm ä :-\skeptical‘:-)devilish

17 Slide 3-17 Management Concerns - Electronic Mail ä Are employees using email capabilities only for intended purposes? ä Have procedures been provided identifying specific usage policies? ä Should employee email messages be monitored?

18 Slide 3-18 Telecommuting ä Telecommuting: employee working at home and transferring data to and from office ä Teleworking: form of telecommuting referring to working away from the office but not necessarily to home (“telecommuting” is sometimes used to refer to this option, too) ä Virtual office: seeming to be conducting business from an office, without needing to be in any one location

19 Slide 3-19 Telecommuting, continued ä Advantages include reduction in travel time and travel cost, pollution, ability to work any time of day or night, reduction in needed office space ä Disadvantages include problems with supervision of employees, lack of social interaction, inappropriateness for some types of jobs

20 Slide 3-20 File Transfer Protocol (FTP) ä FTP: rules used to transfer files from one location to another ä Software is available for this use, such as WS_FTP. ä Browsers can also be used to access files. Instead of using HTTP:// preceding a desired Web address, FTP:// is used to indicate the rules to use preceding the name and location of the desired file

21 Slide 3-21 Newsgroups ä Newsgroups: discussion areas available on a continually expanding, wide range of topics. People who access a newsgroup can simply read information provided by others or can add (“post”) their own information to the newsgroup. ä Newsgroups have several main categories of topics, as well as subcategories separated by dots, e.g., misc.jobs.offered ä FAQs: frequently asked questions; these should be read before contributing to a newsgroup

22 Slide 3-22 Mailing Lists ä Also called “LISTSERVs” ä Use email for discussions; messages go to everyone who has subscribed. May be moderated or unmoderated. If unmoderated, no one screens messages before they are transmitted to list. ä Spamming: using mailing lists to send undesired materials such as advertisements to those on mailing list

23 Slide 3-23 Intranets ä Intranet: use of Internet technology for communication within an organization. Web pages are used to provide internal data. Usually quicker and less expensive to change/update than printed materials. ä Firewall: form of security to prevent outsiders from accessing internal data or to restrict internal users to particular sections

24 Slide 3-24 Extranets ä Extranet: use of Internet technology for communication between organizations, where the outside organization has access to designated parts of the intranet, e.g., for monitoring inventory and the need for materials/supplies

25 Slide 3-25


Download ppt "Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon."

Similar presentations


Ads by Google