Slide 11.1 CHAPTER 11 ANALYSIS AND DESIGN. Slide 11.2 Learning outcomes  Summarize approaches for analyzing requirements for e-business systems  Identify.

Slides:



Advertisements
Similar presentations
Chapter 11 Designing the User Interface
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
02/12/00 E-Business Architecture
Chapter 4: Database Management. Databases Before the Use of Computers Data kept in books, ledgers, card files, folders, and file cabinets Long response.
1 SYSTEMS DESIGN Pertemuan 13 s.d 20 Matakuliah: A0554/Analisa dan Perancangan Sistem Informasi Akuntansi Tahun: 2006.
Chapter 9: Moving to Design
Mgt 20600: IT Management & Applications Databases Tuesday April 4, 2006.
E-Business: Intra-Business E-Commerce
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
6 Systems Analysis and Design in a Changing World, Fourth Edition.
Chapter 2 Database System Concepts and Architecture
Chapter 7: The Object-Oriented Approach to Requirements
Chapter 6: The Traditional Approach to Requirements
System Analysis Overview Document functional requirements by creating models Two concepts help identify functional requirements in the traditional approach.
1.Database plan 2.Information systems plan 3.Technology plan 4.Business strategy plan 5.Enterprise analysis Which of the following serves as a road map.
Chapter 11 Analysis and Design
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Systems Analysis and Design in a Changing World, Fifth Edition
Enterprise Systems & Architectures. Enterprise systems are mainly composed of information systems. Business process management mainly deals with information.
Chapter 6 The Traditional Approach to Requirements
Chapter 10 Architectural Design
Chapter 11 Analysis and Design
IS 466 ADVANCED TOPICS IN INFORMATION SYSTEMS LECTURER : NOUF ALMUJALLY 3 – 10 – 2011 College Of Computer Science and Information, Information Systems.
Systems Analysis and Design in a Changing World, Fifth Edition
Copyright © cs-tutorial.com. Introduction to Web Development In 1990 and 1991,Tim Berners-Lee created the World Wide Web at the European Laboratory for.
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
OHT 11.1 © Marketing Insights Limited 2004 Chapter 11 Analysis and Design.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
1 12 Systems Analysis and Design in a Changing World, 2 nd Edition, Satzinger, Jackson, & Burd Chapter 12 Designing Systems Interfaces, Controls, and Security.
Copyright 2002 Prentice-Hall, Inc. Chapter 2 Object-Oriented Analysis and Design Modern Systems Analysis and Design Third Edition Jeffrey A. Hoffer Joey.
Introduction to Databases Trisha Cummings. What is a database? A database is a tool for collecting and organizing information. Databases can store information.
1.file. 2.database. 3.entity. 4.record. 5.attribute. When working with a database, a group of related fields comprises a(n)…
Technology In Action Chapter 11 1 Databases and… Databases and their uses Database components Types of databases Database management systems Relational.
5 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
Slide 12.1 Chapter 12 Implementation. Slide 12.2 Learning outcomes Produce a plan to minimize the risks involved with the launch phase of an e-business.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
ITGS Databases.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Rational Unified Process Fundamentals Module 7: Process for e-Business Development Rational Unified Process Fundamentals Module 7: Process for e-Business.
Slide 11.1 Dave Chaffey, E-Business and E-Commerce Management, 4 th Edition, © Marketing Insights Limited 2009 Chapter 11 Analysis and design.
© 2006 Pearson Addison-Wesley. All rights reserved 2-1 Chapter 2 Principles of Programming & Software Engineering.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Copyright (c) 2014 Pearson Education, Inc. Introduction to DBMS.
UML - Development Process 1 Software Development Process Using UML.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
6 Systems Analysis and Design in a Changing World, Fourth Edition.
E- Tour VIII : Analysis & design E. Widodo. 2 e- Objectives Understand some approaches to analyze requirements of e-Business solution.Understand some.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Advanced Higher Computing Science
Chapter 11 Designing Inputs, Outputs, and Controls.
Chapter 6 The Traditional Approach to Requirements.
Unified Modeling Language
Chapter 11 Analysis and design
MANAGING DATA RESOURCES
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
CHAPTER 9 (part a) BASIC INFORMATION SYSTEMS CONCEPTS
Database Design Hacettepe University
Database Management Systems
Presentation transcript:

Slide 11.1 CHAPTER 11 ANALYSIS AND DESIGN

Slide 11.2 Learning outcomes  Summarize approaches for analyzing requirements for e-business systems  Identify key elements of approaches to improve the interface design and security design of e-commerce systems.

Slide 11.3 Management issues  What are the critical success factors for analysis and design of e-business systems?  What is the balance between requirements for usable and secure systems and the costs of designing them in this manner?  What are the best approaches for incorporating new IS solutions with legacy systems into the architectural design of the e-business?

Slide 11.4 Analysis for e-business  Understanding processes and information flows to improve service delivery  Pant and Ravichandran (2001) say: ‘Information is an agent of coordination and control and serves as a glue that holds together organizations, franchises, supply chains and distribution channels. Along with material and other resource flows, information flows must also be handled effectively in any organization.’

Slide 11.5 Workflow management Workflow is ‘the automation of a business process, in whole or part during which documents, information or tasks are passed from one participant to another for action, according to a set of procedural rules.’

Slide 11.6  Workflow systems automate e-business process by providing a structured framework to support a process.  It helps manage business processes by ensuring that tasks are prioritized to be performed: as soon as possible by the right people in the right order

Slide 11.7 Process  Part of a system that has a clearly defined purpose or objective and clearly defined inputs and outputs.

Slide 11.8 Process modelling  Often use a hierarchical method of establishing  the processes and their constituent sub-processes  the dependencies between processes  the inputs (resources) needed by the processes and the outputs.

Slide 11.9 Task analysis and task decomposition  Before a process can be designed and implemented, a more detailed breakdown is required known as ‘task analysis’  Curtis et al. (1992) framework: Level 1 business process are decomposed into: Level 2 activities which are further divided to: Level 3 tasks and finally: Level 4 sub-tasks.

Figure 11.1 An example task decomposition for an estate agency Source: Adapted from Chaffey (1998)

Slide Process Dependencies  PD summarize the order in which activity occur according to the business rules that govern the processes.  Data flow diagrams and flow charts are widely used as diagramming techniques  Flow process charts  Network diagrams  Event-driven process chain (EPC) model

Figure 11.2 Symbols used for flow process charts

Figure 11.3 Flow process chart showing the main operations performed by users when working using workflow software

Table 11.5 Elements of the event-driven process chain (EPC) model

Figure 11.4 General model for the EPC process definition model

Slide Data modelling  Uses well established techniques used for relational database design  Stages: 1. Identify entities 2. Identify attributes of entities 3. Identify relationships.

Figure 11.5 Generic B2C ER diagram

Slide Identify entities  Entities define the broad groupings of information such as information about different people, transactions or products. Examples include customer, employee, sales orders, purchase orders. When the design is implemented each design will form a database table.  Entity A grouping of related data, example customer entity. Implementation as table.  Database table Each database comprises several tables.

Slide Identify attributes  Entities have different properties known as attributes that describe the characteristics of any single instance of an entity. For example, the customer entity has attributes such as name, phone number and address. When the design is implemented each attribute will form a field, and the collection of fields for one instance of the entity such as a particular customer will form a record.  Attribute A property or characteristic of an entity, implementation as field.  Field Attributes of products, example date of birth.  Record A collection of fields for one instance of an entity, example Customer Smith.

Slide Identify relationships  The relationships between entities requires identification of which fields are used to link the tables. For example, for each order a customer places we need to know which customer has placed the order and which product they have ordered. The fields that are used to relate tables are referred to as key fields. A primary key is used to uniquely identify each instance of an entity and a secondary key is used to link to a primary key in another table.  Relationship Describes how different tables are linked.  Primary key The field that uniquely identifies each record in a table.  Secondary key A field that is used to link tables, by linking to a primary key in another table.

Design for e-business

Slide Client/server architecture – separation of functions  Data storage. Predominantly on server. Client storage is ideally limited to cookies for identification of users and session tracking. Cookie identifiers for each system user are then related to the data for the user which is stored on a database server.  Query processing. Although some validation can be performed on the client.  Display. This is largely a client function.  Application logic. Traditionally, in early PC applications this has been a client function, but for e-business systems the design aim is to maximize the application logic processing including the business rules on the server.

Figure 11.6 Three-tier client server in an e-business environment

Slide The three-tier client server  Require different servers to combine applications logic and database storage  Purpose of each server:  Web server. Manages http requests  Merchant server. Main location of app. Logic  Personalization server. Provides tailored content  Payment commerce server. Manages payment  Catalogue server. A document management server

Figure 11.7 E-business architecture for The B2C Company

Slide Focus on User-centred design Unless a web site meets the needs of the intended users it will not meet the needs of the organization providing the web site. Web site development should be user-centred, evaluating the evolving design against user requirements. (Bevan, 1999a)

Slide Analysis considerations (Bevan)  Who are the important users?  What is their purpose for accessing the site?  How frequently will they visit the site?  What experience and expertize do they have?  What nationality are they? Can they read English?  What type of information are they looking for?  How will they want to use the information: read it on the screen, print it or download it?  What type of browsers will they use? How fast will their communication links be?  How large a screen/window will they use, with how many colours?

Slide Usability  An approach to web-site design intended to enable the completion of user tasks  Involves two key project activities:  Expert reviews  Usability testing

Slide Use-case analysis  Use-case modelling A user-centred approach to modelling system requirements.  The use-case is part of a methodology known as Unified Modelling Language (UML).  Unified Modelling Language (UML) A language used to specify, visualize and document the artefacts of an object- oriented system.

Figure 11.9 Primary use-case scenario for an entire e-commerce purchase cycle

Slide Primary scenario for the Register use-case Pre-condition: A user is active on the web site Scenario: Register Basic path: 1. Use-case starts when customer presses ‘register’ 2. Customer enters name, postal address and 3. The post/zip code will be checked for validity 4. The customer will select ‘submit’ 5. The system will check all fields are present 6. A redirect page will be displayed to thank the customer.

Figure Primary scenario for the Register use-cases for The B2C Company

Slide Information Architecture  The combination of organization, labelling and navigation schemes comprising an information systems  Every information system has an information architecture

Slide Designing the information architecture  Card sorting  The process of arranging a way of organizing objects on the web site  Blueprints  Shows the relationship between pages and other content components  Wireframes  A way of illustrating the layout of an individual page

Figure Site structure diagram (blueprint) showing layout and relationship between pages

Figure Example wireframe for a children’s toy site

Slide Elements of Site design  Style and personality + design  Support the brand  Site organization  Fits audiences information needs  Site navigation  Clear, simple, consistent  Page design  Clear, simple, consistent  Content  Engaging and relevant.

Slide Web accessibility  Number of visually impaired people  Number of users of less popular browsers or variation in screen display resolution  More visitors from natural listings of search engines  Legal requirements

Slide Security requirements for e-commerce  Authentication – are parties to the transaction who they claim to be?  Privacy and confidentiality – is transaction data protected? The consumer may want to make an anonymous purchase.  Integrity – checks that the message sent is complete i.e. that it is not corrupted.  Non-repudiability – ensures sender cannot deny sending message.  Availability – how can threats to the continuity and performance of the system be eliminated?

Slide Managing computer viruses  Boot-sector virus  Worms  Macro-viruses  attachment virus  Trojan viruses  Hoax viruses

Figure The geographic spread of the ‘Slammer’ worm 30 minutes after release Source: Code Red (CRv2) Spread Animation. Copyright © 2001 The Regents of the University of California www-cse.ucsd.edu/~savage/ papers/IEEESP03.pdf

Slide Monitoring of electronic communications  Employee communications monitoring  Acceptable-use policy  Scanning software  Filtering software

Slide management  To minimize the volume  Spam  Internal business  External business  Personal

Slide Security Attacks  Hacking  Phishing  Denial-of-service attacks