VCE IT Theory Slideshows

Slides:



Advertisements
Similar presentations
IT Applications Theory Slideshows By Mark Kelly Vceit.com Website Information Architecture.
Advertisements

Accessing electronic journals from off- campus This causes lots of headaches, but dont despair, heres how to do it! (Please note – this presentation is.
Five Steps in 5 Minutes Close deals faster, more easily, more often! 1.Start a Quote: Input deal amounts and review the available lease options 2.Create.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
Copyright © 2005 EFT Network, Inc. All Rights Reserved. Automated Recurring Payments Flexible Payment Solution.
Marketing for Hospitality and Tourism, 3e©2003 Pearson Education, Inc. Philip Kotler, John Bowen, James MakensUpper Saddle River, NJ Chapter 16.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Power Websites CMS and CSS.
USER DOCUMENTATION (Part of the development phase of the PSM) Mark Kelly
How To Batch Register Your Students
Company/Product Overview. You have lots of files all over the place.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
The Internet as a Communications Tool. Communication is Key “I’ll pay more for a man’s ability to express himself than for any other quality he might.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Characteristics of efficient and effective solutions.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
Area Of Study 2 Information And Communications Technology(ICT)
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Testing Network Security.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Online community & their tools.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Problem Solving Methodology 3 Development.
Telephone Checks Innovative, Flexible, and Convenient Payment Solution.
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
ACMH Website ACMH STAFF RETREAT April 15, 2015 ACMH Education Coordinator: Terri Henrizi.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
Getting Started. Package Overview (GradeQuick)‏ Web-based grade book –Access Anywhere –Always Current Paper grade book “look and feel” Flexible grading.
VCE IT Theory Slideshows by Mark Kelly study design By Mark Kelly, vceit.com, Begin.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
G063 - Intranets, the Internet and Extranet. Learning Objectives: At the end of this topic you should be able to: describe the characteristics and purpose.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Online Applications. Login / Register If a student has already registered then they may login with their username and password. If not registered they.
Knowledge Hub Walkthrough August
Knowledge Hub Walkthrough August
VCE IT Theory Slideshows
VCE IT Theory Slideshows
Digital Citizenship Grades 4-6
Using PCM Virtual Class
How to Access and Redeem Cisco Certification Exam Discount Vouchers Step-by-Step Guide August 2013.
StudentTranscripts Service Overview
VCE IT Theory Slideshows
IT Applications Theory Slideshows
Services Course 9/9/2018 3:37 PM Services Course Windows Live SkyDrive Participant Guide © 2008 Microsoft Corporation. All rights reserved.
Topic 5: Online Communities Press F5 to view!
VCE IT Theory Slideshows by Mark Kelly study design
Getting Started: BCeID Sign Up
StudentTranscripts Service Overview
StudentTranscripts Service Overview
StudentTranscripts Service Overview
VCE IT Theory Slideshows by Mark Kelly study design
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
Getting Started: BCeID Sign Up
VCE IT Theory Slideshows by Mark Kelly study design
VCE IT Theory Slideshows
VCE IT Theory Slideshows
Use of Electronic and Internet advertising options
PRESENTER Getting Started. PRESENTER Getting Started.
StudentTranscripts Service Overview
VCE IT Theory Slideshows
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
VCE IT Theory Slideshows Updated for 2016
StudentTranscripts Service Overview
Unit# 5: Internet and Worldwide Web
StudentTranscripts Service Overview
HOW TO REVIEW A SINGLE CREDIT CARD TRANSACTION IN PAYMENTNET
VCE IT Theory Slideshows
HOW TO SPLIT A CREDIT CARD TRANSACTION BETWEEN MULTIPLE ACCOUNT CODES
Contacting CT Support with MS Lync Chat room
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

VCE IT Theory Slideshows Websites & Data By Mark Kelly mark@vceit.com Vceit.com

Contents (2016-2019) 01. why organisations acquire data via online facilities 02. why individuals and organisations supply data via websites 03. techniques for acquiring data on websites (interactive online solutions ) and reasons for their choice 04. techniques for protecting the rights of individuals and organisations supplying data

Why organisations acquire data via online facilities including - 24 - hour customer access - improved efficiencies through direct data entry by customers, - improvements in effectiveness, and - access to global markets, marketing opportunities and ongoing services

Why use websites to acquire data? Cheap! Compared to international phone call or even mailing a paper-based order 24-hour customer access Important in a global market with many time zones

Why use websites to acquire data? Instant! No delay for post No phone queues Improved efficiencies through direct data entry by customers e.g. When ordering goods, customer does entry rather than employee having to do it.

Why use websites to acquire data? Improvements in effectiveness increased accuracy if visitors enter their own data less chance of error due to thick accents in a phone order data can be processed automatically once entered typed data easier to read than handwritten

Why use websites to acquire data? access to global market people can order from anywhere on the planet massively increased ‘catchment area’, especially for rare & exotic goods

Why use websites to acquire data? Can use prompts to collect the right data Use controls like radio buttons to enforce data integrity Can use electronic validation tools to make sure data are provided, and are in the right format

Why use websites to acquire data? People may be put off by having to email, write or phone Instant communication encourages impulsive purchases!

Why users supply data for online transactions including convenience, variety of choice, reducing costs

Why supply data via websites? To purchase goods and services, Social networking Reach a broad audience Exchanging information Forums, wikis, blogs

Why supply data via websites? Immediate results Anonymity No travel needed for disabled or lazy people. Helping others with your expertise (e.g. forums) Can choose from hundreds of sellers – lots of choice Sellers compete for customers – keeps prices down Can see a lot of detailed information on products before deciding

techniques for acquiring data on websites (not examinable 2016-2019 but may be handy for MMOS data collection)

techniques for acquiring data on websites Collating data from entries in a web form

techniques for acquiring data on websites Web forms

techniques for acquiring data on websites Providing a web forum Online chat

techniques for acquiring data on websites Provide multiple forms of contact Snail mail Web form Live chat FAQ Email Phone

techniques for acquiring data on websites Provide information Document library Support tickets Help search User accounts Support articles Support status information

techniques for acquiring data on websites Accessing an online database Accessing an intranet or extranet Creating a mailing list mass mail-outs and/or discussion groups Allow visitors to upload files to the site Provide downloads

techniques for acquiring data on websites Provide downloads

techniques for protecting the rights of individuals and organisations supplying data including - security protocols and - stating privacy, shipping and returns policies

Protecting the rights of those who supply data security protocols SSL or TLS encryption protects data in transit

Protecting the rights of those who supply data security protocols File encryption – protects data in storage Automatic timeout of idle connections Using Captcha to deter robotic logins But artificial intelligence is getting so good at deciphering Captcha that the Captcha puzzles are now often too hard for real humans to decode.

Protecting the rights of those who supply data security protocols Using other puzzles to prove users are human

Protecting the rights of those who supply data security protocols Logins with usernames and passwords Requiring strong passwords

stating policies regarding Privacy Shipping Returns

Protecting peoples’ rights a contacts link for people to use in case their rights may not have been protected.

protecting the rights of those who supply data Sending a verification email before signing someone up to a mailing list or a site changing a password Using secret questions to back up passwords. Only allowing password changes by sending an email to a user’s registered email address.

protecting the rights of those who supply data Multi-factor authentication Helps deal with stolen passwords. Typically, requiring users to quote a code sent to their mobile phone by SMS. Proves someone not only know a user’s password, but physically possess an item known to belong to the user.

protecting the rights of those who supply data Biometric ID Proves you are physically whom you claim to be. Fingerprint scan Iris/retina scan Voice/face identification (rather easy to fake) DNA test (possibly painful) A note from your mother (guaranteed security)

Since you’ve been so good, here’s a picture you can look at…

VCE IT THEORY SLIDESHOWS By Mark Kelly mark@vceit.com vceit.com These slideshows may be freely used, modified or distributed by teachers and students anywhere on the planet (but not elsewhere). They may NOT be sold. They must NOT be redistributed if you modify them.