Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.

Slides:



Advertisements
Similar presentations
Overview Environment for Internet database connectivity
Advertisements

Section 10.1 Identify how Web sites are structured Explain the role of URLs Describe the function of HTTP Section 10.2 Explain how the Web has affected.
Chapter 11 Database Applications Using Internet Technology David M. Kroenke Database Processing © 2000 Prentice Hall.
Lesson 1. Course Outline E-Commerce and its types, Internet and WWW Basics, Internet standards and protocols, IP addressing, Data communication on internet,
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Concepts of Database Management Seventh Edition
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
A Business process approach
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
EMTM 553 Electronic Commerce Systems
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Copyright 2002 Prentice-Hall, Inc. Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Chapter 16 Designing.
E-Commerce: Technology and Business Development Andy Diaz Sofia Mayor Chris Ratigan.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
EMTM 553 Electronic Commerce Systems
4.1 © 2006 by Prentice Hall 4 Chapter The Digital Firm: Electronic Business and Electronic Commerce.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 The Internet, Intranets, and Extranets Chapter 7.
Building E-Commerce and E-Learning Models Hassanin M. Al-Barhamtoshy
Management Information system E-commerce E-business Supervised by: Miss : Rasha Ragheb Atallah Presentation provided by: Salah Imad AlQady Ramzy Shafeeq.
The Internetworked E-Business Enterprise
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
Principles of Information Systems, Sixth Edition The Internet, Intranets, and Extranets Chapter 7.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
E-Business & Web Technology - 1 © Minder Chen, IT Architectures Minder Chen, Ph.D. Associate Professor of ISOM George Mason University Fairfax,
Future Direction T he significant problems we face cannot be solved at the same level of thinking we were at when we created them” “ T he significant problems.
GENERAL BANK MANAGEMENT Technology Management
Chapter 3 Hardware, Software, and Networks Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 3-1.
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Technology Strategies for the Hospitality Industry© 2005 Pearson Education, Inc Nyheim, McFadden, & Connolly Upper Saddle River, New Jersey Networks.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Chapter Seven E-Business Risks. E-Business Model Evolution EDI EDI Web pages Web pages The online environment The online environment Distributed e-business.
Concepts of Database Management Sixth Edition Chapter 9 Database Management Approaches.
Chapter 3 E-business Infrastructure
Business-to-Business Authors: Authors: Mladenka Jakovljevic, Prof. Dr. Veljko Milutinovic,
ELECTRONIC COMMERCE, STRATEGY & MANAGEMENT (COM350)
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
E-Business E-Commerce M-Commerce Prachyanun Nilsook, Ph.D.
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
1 Topics about Data Warehouses What is a data warehouse? How does a data warehouse differ from a transaction processing database? What are the characteristics.
Principles of Information Systems, Sixth Edition 1 The Internet, Intranets, and Extranets Chapter 7.
CIS 210 Systems Analysis and Development Week 8 Part II Designing Distributed and Internet Systems,
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
1 Accounting Information Systems: A Business Process Approach Chapter Twelve: Using Technology to Enhance Business Processes.
Intranet Steve Andy Michael. Intranet A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© 2003 Prentice Hall, Inc.4-1 Chapter 4 Telecommunications and the Internet Information Systems Today Leonard Jessup & Joseph Valacich.
Web Services Security Patterns Alex Mackman CM Group Ltd
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
Chapter 17: Information Management in Treasury Outline: Basics of E-Commerce EDI Infrastructure Treasury Management Systems (TMSes) Other Issues in Treasury.
Marketing Principles CHAPTER 9 SECTION2.  A common use of computers in retail is the point-of-sale (POS) system.  Managing the relationships the company.
1 LM 6 Database Applications Dr. Lei Li. Learning Objectives Explain three components of a client-server system Describe differences between a 2-tiered.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Published by Flat World Knowledge, Inc. © 2014 by Flat World Knowledge, Inc. All rights reserved. Your use of this work is subject to the License Agreement.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Discovering Computers 2010: Living in a Digital World Chapter 14
Chapter 16 Designing Distributed and Internet Systems
EMTM 553 Electronic Commerce Systems
File Operations Access Permissions.
Presentation transcript:

Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES

IT Environment IT strategy IT infrastructure IT function Systems development process

Business Strategy and the Value Chain Alternative strategies IT and value-chain management

IT and Multi-User Systems Terminal emulation File-server approach Client-server systems

E-Business E-business basics Static and dynamic Web pages for e-business applications Client tier Middle tier Bottom tier

E-Business E-business and business processes Interacting with customers Interacting with suppliers Internal operations

Organizing and Analyzing Data Data warehousing Integrated data Nonvolatile data Summary and detailed data Multi-dimensional data Data mining E-commerce and data mining

Integrating Business Processes, Data, and Applications Enterprise resource planning (ERP) systems Magnitude and scope of ERP systems Selection and use of ERP Integration of the supply chain through e-commerce

Integrating Business Processes, Data, and Applications XML (Extensible Markup Language) Relational databases and data integrity Customer relationship management systems

IT and Business Processes: Risks and Controls Privacy Data collection User control Privacy policies Secure transactions Encryption and authentication Digital signatures, hashing, and message integrity Digital certificates Timestamping

IT and Business Processes: A Role for Accountants Assurance services Analyze IT investments Design and implement IT solutions Enhance value of current services

K E Y T E R M S Asymmetric key encryption Bottom tier Classification tree Client-server system Client tier Cookie Customer relationship management (CRM) system Data mining

K E Y T E R M S Data warehouse Dynamic Web pages E-business E-commerce Electronic data interchange (EDI) Enterprise resource planning (ERP) system

K E Y T E R M S Extranets File server Firewall Genetic algorithm HTML (Hypertext Markup Language) Information technology (IT) environment

K E Y T E R M S Internet protocol (IP) address Intranet IT function IT infrastructure IT strategy Local area network (LAN)

K E Y T E R M S Middle tier Multi-dimensional analysis Neural nets OLTP OLAP Personally identifiable information Static Web pages

K E Y T E R M S Statistical analysis Symmetric key encryption Systems development process Terminal emulation Three-tier, client-server architecture

K E Y T E R M S Value chain Wide area networks (WAN) XML (Extensible Markup Language) XML Schema XSL (Extensible Style Sheet Language)