CIS 429 Fall 2007 Review for Comprehensive Final.

Slides:



Advertisements
Similar presentations
Chapter 1 Business Driven Technology
Advertisements

By: Mr Hashem Alaidaros MIS 211 Lecture 4 Title: Data Base Management System.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Accessing Organizational Information—Data Warehouse
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 8-1 BUSINESS DRIVEN TECHNOLOGY Chapter Eight: Viewing and Protecting Organizational.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill/Irwin Copyright © 2008, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Business Systems Chapter 7.
Electronic Business Systems Cross-functional Enterprise Systems Functional Business Systems Chapter 7 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill.
IS500: Information Systems Instructor: Dr. Boris Jukic Decision Support Systems.
7-1 PowerPoint Presentation by Douglas Cloud Professor Emeritus of Accounting Pepperdine University © Copyright 2007 Thomson South-Western, a part of The.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved DATABASES AND DATA WAREHOUSES Opening Case Searching for Revenue - Google DATABASES.
Business Intelligence Andrew Davis Andria Zippler Jana Krinsky Tiffany Ferris.
Information Technology and E- Business Chapter 20.
Information Systems for Strategic Advantage ISYS 363.
Business Driven Technology Unit 2
Performance Assessment Min Song, Ph.D. Is 465. LEARNING OUTCOMES 4.1 Compare efficiency IT metrics and effectiveness IT metrics 4.2 List and describe.
Business Driven Technology Unit 1
BUSINESS DRIVEN TECHNOLOGY
1 Chapter 9 Electronic Commerce and Electronic Business.
Electronic Commerce Systems
Chapter 9 e-Commerce Systems.
TOPIC 1: GAINING COMPETITIVE ADVANTAGE WITH IT (CONTINUE) SUPPLY CHAIN MANAGEMENT & BUSINESS INTELLIGENCE.
Lecture-9/ T. Nouf Almujally
Enterprise Resource Planning (ERP)
CHAPTER 04 Measuring the Success of Strategic Initiatives
E-Business / E-Commerce Marketing in the Digital Age
Electronic Business Systems
Karolina Muszyńska Based on
Irwin/McGraw-Hill Copyright © 2001, The McGraw-Hill Companies, Inc. All rights reserved. I n t r o d u c t i o n t o I n f o r m a t i o n S y s t e m.
Consumer Behavior, Market Research
Protecting People and Information: Threats and Safeguards
Enabling Organization-Decision Making
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 3 Strategic Initiatives for Implementing Competitive Advantages.
MAJOR BUSINESS INITIATIVES Gaining Competitive Advantage with IT
Carl Holmes Christy Lee Vendor Information SAP is headquarters is in Walldorf, Germany. Largest computer software company in the world. 47,804 employees.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved E-BUSINESS Plug-In B11.
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
CHAPTER 4 Marketing Information and Research: Analyzing the Business Environment Off-line and Online M A R K E T I N G.
Copyright © 2004 by South-Western, a division of Thomson Learning, Inc. All rights reserved. Developed by Cool Pictures and MultiMedia Presentations.
@ ?!.
Chapter 4 Measuring the Success of Strategic Initiatives.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER SIX DATA: BUSINESS INTELLIGENCE.
Business Driven Technology Unit 1 Achieving Business Success Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
BUSINESS DRIVEN TECHNOLOGY UNIT 4: Creating Collaborative Partnerships in Business UNIT FOUR OPENING CASE Amazon.com – Just a Click Away.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 4 Measuring the Success of Strategic Initiatives.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B18 Business Intelligence.
Database Design Part of the design process is deciding how data will be stored in the system –Conventional files (sequential, indexed,..) –Databases (database.
Chapter 1 Business Driven Technology MANGT 366 Information Technology for Business Chapter 1: Management Information Systems: Business Driven MIS.
BUSINESS DRIVEN TECHNOLOGY
7-1 McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Lecture 3 Strategic E-Marketing Instructor: Hanniya Abid
6.1 © 2010 by Prentice Hall 6 Chapter Foundations of Business Intelligence: Databases and Information Management.
AN INTELLIGENT AGENT is a software entity that senses its environment and then carries out some operations on behalf of a user, with a certain degree of.
1 Technology in Action Chapter 11 Behind the Scenes: Databases and Information Systems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 4-1 BUSINESS DRIVEN TECHNOLOGY Chapter Four: Measuring the Success of Strategic.
7-1 Computerized Accounting Systems Electronic Presentation by Douglas Cloud Pepperdine University Chapter F7.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 6 DATABASES AND DATA WAREHOUSES CHAPTER 6 DATABASES AND DATA WAREHOUSES.
Data: Business Intelligence Chapter 6 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter7 TELECOMMUNICATIONS AND NETWORKS. Content e-Business Systems – Cross-Functional Enterprise Applications – Enterprise Application Integration –
Managing Information and Technology Exploring Business Class 11 Tuesday 10/4/11.
C HAPTER 2 O VERVIEW OF E LECTRONIC C OMMERCE. LEARNING OBJECTIVES 1. Define electronic commerce (EC) and describe its various categories. 2. Describe.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
1 © 2014 by McGraw-Hill Education. This is proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Chapter 3 Building Business Intelligence Chapter 3 DATABASES AND DATA WAREHOUSES Building Business Intelligence 6/22/2016 1Management Information Systems.
Exam 1 Terminology Review
CHAPTER SIX OVERVIEW SECTION 6.1 – DATABASE FUNDAMENTALS
Presentation transcript:

CIS 429 Fall 2007 Review for Comprehensive Final

E-BUSINESS MODELS

Business-to-Business (B2B) Electronic marketplace (e- marketplace) – interactive business communities providing a central market where multiple buyers and sellers can engage in e-business activities

Marketing/Sales Generating revenue on the Internet (cont.) – Search engine optimization (SEO) - a set of methods aimed at improving the ranking of a Web site in search engine listings, such as Google or Yahoo – Spamdexing - uses a variety of deceptive techniques in an attempt to manipulate search engine rankings, whereas legitimate SEO focuses on building better sites and using honest methods of promotion

ENTERPRISE RESOURCE PLANNING Enterprise resource planning (ERP) – integrates all departments and functions throughout an organization into a single IT system so that employees can make decisions by viewing enterprisewide information on all business operations ERP collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business

SUPPLY CHAIN MANAGEMENT Supply Chain Management (SCM) – involves the management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability SCM integrates supplier, manufacturer, distributor, and logistics processes.

BUSINESS PROCESS REENGINEERING Reengineering the Corporation – by Michael Hammer and James Champy - recommends seven BPR principles

Value Creation Value Chain

Artificial Intelligence (AI) Intelligent system – various commercial applications of artificial intelligence Artificial intelligence (AI) – simulates human intelligence such as the ability to reason and learn

E-BUSINESS BASICS How do e-commerce and e-business differ? – E-commerce – the buying and selling of goods and services over the Internet – E-business – the conducting of business on the Internet including, not only buying and selling, but also serving customers and collaborating with business partners

Association Detection Association detection – reveals the degree to which variables are related and the nature and frequency of these relationships in the information – Market basket analysis – analyzes such items as Web sites and checkout scanner information to detect customers’ buying behavior and predict future behavior by identifying affinities among customers’ choices of products and services

Association Detection Association detection – reveals the degree to which variables are related and the nature and frequency of these relationships in the information – Market basket analysis – analyzes such items as Web sites and checkout scanner information to detect customers’ buying behavior and predict future behavior by identifying affinities among customers’ choices of products and services

DATA WAREHOUSE FUNDAMENTALS Data warehouse – a logical collection of information – gathered from many different operational databases – that supports business analysis activities and decision-making tasks The primary purpose of a data warehouse is to aggregate information throughout an organization into a single repository for decision- making purposes

Multidimensional Analysis Databases contain information in a series of two-dimensional tables In a data warehouse and data mart, information is multidimensional, it contains layers of columns and rows – Dimension – a particular attribute of information

DATA MINING Common forms of data-mining analysis capabilities include: – Cluster analysis – Association detection – Statistical analysis

Application Software Most common types of application software – Browser: surfing the Internet – Database management system: directly access large numbers of data records – communication – Presentation graphics: slide shows – Spreadsheet: performing complex calculations – Word processing: creating documents

Primary keys and foreign keys identify the various entities (rows) in a table – Primary key – a field (or group of fields) that uniquely identifies a given row in a table – Foreign key – a field or fields in a table that is a primary key of some other table and acts to form a logical relationship between the two tables RELATIONAL DATABASE FUNDAMENTALS

The Interrelationships of Efficiency and Effectiveness IT Metrics Efficiency IT metrics focus on technology and include: – Throughput – Transaction speed – System availability – Information accuracy – Web traffic – Response time

The Interrelationships of Efficiency and Effectiveness IT Metrics Effectiveness IT metrics focus on an organization’s goals, strategies, and objectives and include: – Usability – Customer satisfaction – Conversion rates – Financial

MEASURING E-BUSINESS SUCCESS Web site traffic analysis can include: – Cookie A text file placed by a web site on the user’s hard drive to track user information and activities – Click-through A count of users who click on a web site ad – Banner ad A small ad on a web site – Interactivity Visitor interactions with a target ad

ETHICS Ethics – the principles and standards that guide our behavior toward other people Issues affected by technology advances – Intellectual property: intangible creative work – Copyright: legal protection afforded intellectual property – Fair use doctrine: legal use of copyrighted material – Pirated software: unauthorized use of software – Counterfeit software: Software manufactured to look real and sold as such

Detection and Response Virus - software written with malicious intent to cause annoyance or damage – Worm: spreads itself among files & computers – Denial-of-service attack (DoS): flooding web sites – Distributed denial-of-service attack (DDoS): attacks from multiple computers – Trojan-horse: hides inside other software – Backdoor program: open a way for future attack – Polymorphic virus and worm: change their form as they propagate