Chapter 11 Analysis and Design

Slides:



Advertisements
Similar presentations
Chapter 11 Designing the User Interface
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Electronic Transaction Security (E-Commerce)
Practical Object-Oriented Design with UML 2e Slide 1/1 ©The McGraw-Hill Companies, 2004 PRACTICAL OBJECT-ORIENTED DESIGN WITH UML 2e Chapter 5: Restaurant.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Chapter 11 Analysis and Design
CIS 1310 – HTML & CSS 12 E-Commerce Overview. CIS 1310 – HTML & CSS Learning Outcomes  Define E-commerce  Identify Benefits & Risks of E-Commerce 
Secure Electronic Transaction (SET)
OHT 11.1 © Marketing Insights Limited 2004 Chapter 11 Analysis and Design.
1 Chapter 11 Implementation. 2 System implementation issues Acquisition techniques Site implementation tools Content management and updating System changeover.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 7.1 Learning objectives Describe the different stages involved in creating.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright 2002 Prentice-Hall, Inc. Chapter 2 Object-Oriented Analysis and Design Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Slide 12.1 Chapter 12 Implementation. Slide 12.2 Learning outcomes Produce a plan to minimize the risks involved with the launch phase of an e-business.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
E-Commerce. E-commerce at the consumer level  Online shopping (B2C transactions)  Online banking  Online Finance E-commerce at the business level 
Slide 11.1 Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 Chapter 11 Analysis and design.
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Slide 11.1 CHAPTER 11 ANALYSIS AND DESIGN. Slide 11.2 Learning outcomes  Summarize approaches for analyzing requirements for e-business systems  Identify.
Systems Development Lifecycle
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Electronic Banking & Security Electronic Banking & Security.
Web Development & Design Foundations with XHTML Chapter 12 Key Concepts.
Copyright © Terry Felke-Morris Web Development & Design Foundations with HTML5 8 th Edition CHAPTER 12 KEY CONCEPTS 1 Copyright.
E- Tour VIII : Analysis & design E. Widodo. 2 e- Objectives Understand some approaches to analyze requirements of e-Business solution.Understand some.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
WEB TESTING
Chapter 3 The Internet macro-environment
Section A: Web Technology
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Chapter 11 Analysis and design
Lecture 23 CS 507.
Presentation transcript:

Chapter 11 Analysis and Design

Learning objectives Summarize approaches for analysing requirements for e-business systems Identify key elements of approaches to improve the interface design and security design of e-commerce systems

Issues for managers What are the critical success factors for analysis and design of e-business systems? What is the balance between requirements for usable and secure systems and the costs of designing them in this manner? What are the best approaches for incorporating new IS solutions with legacy systems into the architectural design of the e-business?

Workflow management Workflow is ‘the automation of a business process, in whole or part during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules.’ Examples: Booking a holiday Handling a customer complaint Receiving a customer order

Process modelling Often use a hierarchical method of establishing the processes and their constituent sub-processes the dependencies between processes the inputs (resources) needed by the processes and the outputs Complete activity 11.2 using Figure 11.2 and Table 11.2 for how to improve processes

An example task decomposition for an estate agency Figure 11.1  An example task decomposition for an estate agency Source: Chaffey (1998)

Symbols used for flow process charts Figure 11.2  Symbols used for flow process charts

Flow process chart showing the main operations performed by users when working using workflow software Figure 11.3  Flow process chart showing the main operations performed by users when working using workflow software

Data modelling Uses well established techniques used for relational database design Stages: Identify entities Identify attributes of entities Identify relationships

Generic B2C ER diagram Figure 11.5  Generic B2C ER diagram

Client / server architecture – separation of functions Data storage. Predominantly on server. Client storage is ideally limited to cookies for identification of users and session tracking. Cookie identifiers for each system user are then related to the data for the user which is stored on a database server. Query processing. Predominantly on the server, although some validation can be performed on the client. Display. This is largely a client function. Application logic. Traditionally, in early PC applications this has been a client function, but for e-business systems the design aim is to maximize the application logic processing including the business rules on the server.

Three-tier client server in an e-business environment Figure 11.6  Three-tier client server in an e-business environment

E-business architecture for the B2C company Figure 11.7  E-business architecture for The B2C Company

User centred design ‘Unless a web site meets the needs of the intended users it will not meet the needs of the organization providing the web site. Web site development should be user-centred, evaluating the evolving design against user requirements.’ (Bevan, 1999a)

Analysis considerations (Bevan) Who are the important users? What is their purpose for accessing the site? How frequently will they visit the site? What experience and expertise do they have? What nationality are they? Can they read English? What type of information are they looking for? How will they want to use the information: read it on the screen, print it or download it? What type of browsers will they use? How fast will their communication links be? How large a screen/window will they use, with how many colours?

4 stages of Rosenfeld and Morville (1998) Identify different audiences. Rank importance of each to business. List the three most important information needs of audience. Ask representatives of each audience type to develop their own wishlists.

Use-case analysis The use-case method of process analysis and modelling was developed in the early 1990s as part of the development of object-oriented techniques. It is part of a methodology known as Unified Modelling Language (UML) that attempts to unify the approaches that preceded it such as the Booch, OMT and Objectory notations. Use-case modelling A user-centred approach to modelling system requirements. Unified Modelling Language (UML) A language used to specify, visualize and document the artefacts of an object-oriented system.

Schneider and Winters (1998) stages in Use Case Identify actors. Actors are typically application users such as customers and employers also other systems. Identify use-cases. The sequence of transactions between an actor and a system that support the activities of the actor. Relate actors to use-cases. See Figure 11.8. Develop use-case scenarios. See Figure 11.9 for a detailed scenario.

Relationship between actors and use-cases for the B2C Company, sell-side e-commerce site Figure 11.8  Relationship between actors and use-cases for The B2C Company, sell-side e-commerce site

Primary use case scenario for an entire e-commerce purchase cycle Figure 11.9  Primary use-case scenario for an entire e-commerce purchase cycle

Primary scenario for the Register use-cases for the B2C Company Figure 11.10  Primary scenario for the Register use-cases for The B2C Company

Site design issues Covered by the eight principles that follow Style and personality + design Support the brand Site organisation Fits audience’s information needs Site navigation Clear, simple, consistent Page design Content Engaging and relevant Covered by the eight principles that follow

Site design principle 1 Standards ‘Users spend most of their time on other sites. This means that users prefer your site to work the same way as all the other sites they already know… Think Yahoo and Amazon. Think "shopping cart" and the silly little icon. Think blue text links’. Jakob Nielsen - www.useit.com

Principle 2 Support marketing objectives Support customer lifecycle Acquisition – of new or existing customers Retention – gain repeat visitors Extension - cross- and up-selling Support communications objectives 3 key tactics Communicate the online value proposition Establish credibility Convert customer to action

Principle 3 Customer orientation Content + services support a range of audiences and… Different segments 4 familiarities – With Internet – With company – With products – With web site

Principle 4 Lowest Common Denominator Access speed Screen resolution and colour depth Web browser type Browser configuration Text size Plug-ins www.usability.serco.com

Principle 5 Aesthetics fit the brand Aesthetics = Graphics + Colour + Style + Layout + Typography Site personality How would you describe the site if it were a person? E.g. Formal, Fun, Engaging, Entertaining, Professional Site style Information vs graphics intensive Cluttered vs clean Are personality and style consistent with brand and customer orientation?

Principle 6 Get the structure right Back (a) (b) (d) DTI Cisco

Principle 7 Make navigation easy According to Nielsen, need to establish: Where am I? Where have I been? Where do I want to go? Context. Consistency. Simplicity. Use accepted standards for navigation:

Navigation continued ‘Go with the flow’ Enter by: To: Visitor in control An enjoyable experience ‘Think like a client’ Enter by: user need product / service audience type search To: alternate home pages

Principle 8 Support user psychology Hofacker’s 5 stages of information processing Exposure – can it be seen? Attention – does it grab? Comprehension and perception - is message understood? Yielding and acceptance : Is it credible and believable? Retention – is the message and experience remembered?

Parties involved in secure transactions Purchasers. These are the consumers buying the goods. Merchants. These are the retailers. Certification Authority (CA). This is a body that issues digital certificates that confirm the identity of purchasers and merchants. Banks. These are traditional banks. Electronic token issuer. A virtual bank that issues digital currency.

Main security risks (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from merchant’s server. (c) Merchant or customer is not who they claim to be.

Security requirements for e-commerce Authentication – are parties to the transaction who they claim to be? Privacy and confidentiality – is transaction data protected? The consumer may want to make an anonymous purchase. Are all non-essential traces of a transaction removed from the public network and all intermediary records eliminated? Integrity – checks that the message sent is complete i.e. that it isn’t corrupted. Non-repudiability – ensures sender cannot deny sending message. Availability – how can threats to the continuity and performance of the system be eliminated?

Public-key or asymmetric encryption Figure 11.18  Public-key or asymmetric encryption

Security Protocols Secure Socket Layer (SSL): Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality Secure Electronic Transaction (SET): A protocol designed to provide secure online credit card transactions for both consumers and merchants; developed jointly by Netscape, Visa, MasterCard, and others

SET Figure 11.19  An example of the Secure Electronic Transaction (SET) standard