Invitation to Computer Science 5th Edition

Slides:



Advertisements
Similar presentations
Back to Table of Contents
Advertisements

CHAPTER 7 Roderick Dickson Kelli Grubb Tracyann Pryce Shakita White.
Management Information Systems, Sixth Edition
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 10 Site Architecture McGraw-Hill/Irwin Copyright © 2004 by The McGraw-Hill Companies, Inc. All rights reserved.
Data - Information - Knowledge
Fundamentals of Information Systems, Second Edition 1 Electronic Commerce and Transaction Processing Systems.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, Java Version, Third Edition.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Databases Chapter Distinguish between the physical and logical view of data Describe how data is organized: characters, fields, records, tables,
Chapter Two Information Technologies: Concepts and Management.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Business Systems Chapter 7.
7-1 PowerPoint Presentation by Douglas Cloud Professor Emeritus of Accounting Pepperdine University © Copyright 2007 Thomson South-Western, a part of The.
Organizing Data & Information
Electronic Commerce and Transaction Processing Systems
1 Chapter 7 IT Infrastructures Business-Driven Technology
Introduction to Databases Transparencies
Copyright © 2002 Pearson Education, Inc.
Chapter 10 Managing the Delivery of Information Services.
BUSINESS DRIVEN TECHNOLOGY
Electronic Commerce Systems
Chapter 9 e-Commerce Systems.
PHASE 3: SYSTEMS DESIGN Chapter 7 Data Design.
Understanding Back-End Systems Chapter 9. Front-End Systems Front- end systems are those processes with which a user interfaces, and over which a customer.
Electronic Business Systems
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 2-1 Lecture Outline 9 1. Using Information Systems for Competitive Advantage (p )
Chapter 11 Databases.
What is E-commerce Safety Precautions Password Strengths
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
6-1 DATABASE FUNDAMENTALS Information is everywhere in an organization Information is stored in databases –Database – maintains information about various.
1 Advanced Computer Programming Databases. Overview What is a database? Database Basics Database Components Data Models Normalization Database Design.
MSS*: Chapter 3 Shopping carts & Payment gateways * McClure, Stuart, Saumil Shah, and Shreeraj Shah. Web Hacking: attacks and defense. Addison Wesley.
1 An Introduction to Electronic Commerce Electronic commerce: conducting business activities (e.g., distribution, buying, selling, marketing, and servicing.
MSF Requirements Envisioning Phase Planning Phase.
Exam 2 Terminology Review MIS Question 1 The second generation of the Web: A. Ecommerce B. Internet2 C. Web 2.0 D. All of the above.
STORING ORGANIZATIONAL INFORMATION— DATABASES CIS 429—Chapter 7.
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Organizing Data and Information AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
HNDComputing – DeMontfort University  DeMontfort University 2011 Database Fundamentals wk2 Database Design ConceptsDatabase Design Concepts Database Design.
Chapter © 2006 The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/ Irwin Chapter 7 IT INFRASTRUCTURES Business-Driven Technologies 7.
Access 2013 Microsoft Access 2013 is a database application that is ideal for gathering and understanding data that’s been collected on just about anything.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 9B Doing Business in the Online World.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
Storing Organizational Information - Databases
C6 Databases. 2 Traditional file environment Data Redundancy and Inconsistency: –Data redundancy: The presence of duplicate data in multiple data files.
Organizing Data and Information. What is Data?? Numbers, characters, images, or other method of recording, in a form which can be assessed by a human.
Module 2: Information Technology Infrastructure Chapter 5: Databases and Information Management.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
Database Design – Lecture 18 Client/Server, Data Warehouse and E-Commerce Database Design.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
7-1 Computerized Accounting Systems Electronic Presentation by Douglas Cloud Pepperdine University Chapter F7.
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Chapter 13.3: Databases Invitation to Computer Science, Java Version, Second Edition.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Foundations of Information Systems in Business
Fundamentals of Information Systems, Sixth Edition Chapter 1 Part A An Introduction to Information Systems in Organizations.
1 Information Retrieval and Use De-normalisation and Distributed database systems Geoff Leese September 2008, revised October 2009.
Electronic Business: Concept and Applications Department of Electrical Engineering Gadjah Mada University.
Discovering Computers 2010: Living in a Digital World Chapter 14
MANAGING DATA RESOURCES
Understanding Back-End Systems
Database Design Chapter 7.
Presentation transcript:

Invitation to Computer Science 5th Edition Chapter 14 Electronic Commerce and Databases

Objectives In this chapter, you will learn about: E-commerce Databases Invitation to Computer Science, 5th Edition

Introduction E-commerce world E-business Financial transactions are conducted by electronic means E-business Orders are processed, credit is verified, transactions are completed, debits are issued, shipping is alerted, and inventory is reduced, all electronically Invitation to Computer Science, 5th Edition 3

E-Commerce Do you want to: Broaden your customer base? Recapture customers you are losing to competitors with online stores? Better serve your existing customer base? Better integrate departments/functions within your existing business? Invitation to Computer Science, 5th Edition 4

The Vision Thing Risks involved with moving into e-commerce Will you just move your in-store customers online and achieve no overall gain? When you expose yourself to online competition, will you have something unique to offer? Does your existing customer base need or want anything that you don’t or can’t provide in your traditional business environment? Are the employees in your Shipping and Accounting departments in agreement with this idea? Invitation to Computer Science, 5th Edition

The Vision Thing (continued) Costs involved Do you have all the necessary hardware (computers), software, and infrastructure (network connectivity) to host a business Web site? Do you have the personnel and skills you need to build and maintain a Web site? Do you know the potential costs of diverting resources away from your existing traditional business? Invitation to Computer Science, 5th Edition

Decisions, Decisions First major decision Choose between in-house development and outsourcing Are you going to use your existing staff to develop this e-business Will you lease space on someone else’s commercial Web server Invitation to Computer Science, 5th Edition

Anatomy of a Transaction Goals Draw potential customers to your site Keep them there Set up optimum conditions for them to complete a purchase Invitation to Computer Science, 5th Edition

Figure 14.1 A Typical Online Transaction in Nine Steps Invitation to Computer Science, 5th Edition

Step 1: Getting There How does your potential customer learn your URL? Conventional advertising Obvious domain name Search engine Portal Invitation to Computer Science, 5th Edition

Step 2: Do I Know You? Cookie Stateless Small text file that Web server sends to user’s browser that gets stored on the user’s hard drive Stateless No information about the exchange is permanently retained by the server Invitation to Computer Science, 5th Edition

Step 3: Committing to an Online Purchase Encryption Encodes data to be transmitted into a scrambled form Authentication Process of verifying the identity of the receiver of the data Spoofing Practice of impersonating a legitimate site for the purposes of stealing money or stealing identity Invitation to Computer Science, 5th Edition

Steps 4 and 5: Payment Processing Figure 14.2 Secure Site Assurance Invitation to Computer Science, 5th Edition

Steps 6–9: Order Fulfillment Once customer’s credit is approved, order entry system must alert inventory system Step 7 Contact shipping system Step 8 Shipping system works with the shipping company Step 9 Pick up and deliver the purchase to the customer Invitation to Computer Science, 5th Edition

Designing Your Web Site Taxonomy How information is classified and organized so customers can easily find what they want Site map or a navigation bar Can provide a high-level overview of your site architecture CRM (customer relationship management) strategy Improve customer satisfaction Build customer relationships Bring people back to your Web site time and time again Invitation to Computer Science, 5th Edition

Behind the Scenes Middleware Disaster recovery strategy Software that allows separate, existing programs to communicate and work together seamlessly Disaster recovery strategy What are your plans for backing up critical data? What is your plan to keep your online business open even when your server fails? What will you do if a hacker breaks into your Web site and steals customer information? Invitation to Computer Science, 5th Edition

Databases Bit Fields Record Most basic unit of data Combined into groups of eight called bytes Fields Group of bytes Record Collection of related fields Invitation to Computer Science, 5th Edition

Databases (continued) Data file Stores related records Database Made up of related files Invitation to Computer Science, 5th Edition

Figure 14.3 Data Organization Hierarchy Invitation to Computer Science, 5th Edition

Figure 14.4 Records and Fields in a Single File Invitation to Computer Science, 5th Edition

Figure 14.5 One Record in the Rugs-For-You Employees File Invitation to Computer Science, 5th Edition

Database Management Systems Manage the files in a database Entity Fundamental distinguishable component Attribute Category of information Primary key Attribute or combination of attributes that uniquely identifies a tuple Invitation to Computer Science, 5th Edition

Figure 14.6 Employees Table for Rugs-For-You Invitation to Computer Science, 5th Edition

Database Management Systems (continued) Query languages Enable user or another application program to query the database, in order to retrieve information Composite primary key Needed to identify a tuple uniquely Foreign key Key from another table that refers to a specific key, usually the primary key Invitation to Computer Science, 5th Edition

Figure 14.7 Insurance Policies Table for Rugs-For-You Invitation to Computer Science, 5th Edition

Figure 14.8 Three Entities in the Rugs-For-You Database Invitation to Computer Science, 5th Edition

Other Considerations Performance issues Affect the user’s satisfaction with a database management system To significantly reduce access time: Create additional records to be stored along with the file Distributed databases Allow the physical data to reside at separate and independent locations that are electronically networked together Invitation to Computer Science, 5th Edition

Summary E-business Opening an online store Database Every part of a financial transaction is handled electronically Opening an online store Requires a significant amount of planning Database Allows data items to be stored, extracted, sorted, and manipulated Relational database model Conceptual model of a file as a two-dimensional table Invitation to Computer Science, 5th Edition