Presentation is loading. Please wait.

Presentation is loading. Please wait.

Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.

Similar presentations


Presentation on theme: "Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities."— Presentation transcript:

1 Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities

2 Created by, Author Name, School Name—State Data and Information PART 3

3 Created by, Author Name, School Name—State WORKING ONLINE eCommerce and Interactive Networking chapter 16

4 Copyright © 2003 Pearson Education, Inc. Slide 16-4 CHALLENGES OF ECOMMERCE

5 Copyright © 2003 Pearson Education, Inc. Slide 16-5 THE CHALLENGE OF VARIATION > Global Customers > Many Business Rules > Diverse Products and Information > Diverse Shopping Experiences

6 Copyright © 2003 Pearson Education, Inc. Slide 16-6 STRUCTURE OF THE SETTING > The Client/Server Structure > Many Brief Relationships > Creating Web Pages On-the-Fly > Middleware

7 Copyright © 2003 Pearson Education, Inc. Slide 16-7 Figure 16.1. The basic client/server structure, as illustrated by the browser (client) requesting Web pages provided by the Web server.

8 Copyright © 2003 Pearson Education, Inc. Slide 16-8 Figure 16.2. Client/server relationships as they might evolve over time.

9 Copyright © 2003 Pearson Education, Inc. Slide 16-9 DISCRETE EVENTS > The Discrete Event Problem > One Solution with Cookies > Another Solution Without Cookies

10 Copyright © 2003 Pearson Education, Inc. Slide 16-10 Figure 16.3. An imaginary interaction between client and server. A cookie stored at the client lets the server connect independent events into a dialog. Notice that the cookie also connects to an earlier session when the customer gave an email address, credit card number, and probably mailing address.

11 Copyright © 2003 Pearson Education, Inc. Slide 16-11 Figure 16.4. A three-tier system in which backend tasks are performed by CGI (Common Gateway Interface).

12 Copyright © 2003 Pearson Education, Inc. Slide 16-12 Figure 16.5. Middleware performs an operation on a three-tier system; the process moves to the right; the Client Computer boxes represent one computer at different points in time; similarly for the Server Computer boxes.

13 Copyright © 2003 Pearson Education, Inc. Slide 16-13 TRANSACTIONS DO THE WORK > Simultaneous Requests > Transactions Interleaved > Serialized Behavior: Transactions Happen One at a Time

14 Copyright © 2003 Pearson Education, Inc. Slide 16-14 Figure 16.6. Correct processing of two withdrawals from a bank account.

15 Copyright © 2003 Pearson Education, Inc. Slide 16-15 Figure 16.7. Two withdrawal transactions interleaved in time produce the wrong balance—that is, corrupt the database.

16 Copyright © 2003 Pearson Education, Inc. Slide 16-16 THE STANDARDS CASE > Common Language > Web Standard Languages > Importance of Standards to Communicate > Agreeing on Standards

17 Copyright © 2003 Pearson Education, Inc. Slide 16-17 REDUNDANCY IS VERY, VERY, VERY GOOD > A Fault Recovery Program for Business > Backing Up a Personal Computer — Do it on a regular basis — Segregate the backup data from “temp” data. — What can you afford to lose — What can you easily recover > A backup strategy

18 Created by, Author Name, School Name—State SHHH, IT’S A SECRET Privacy and Digital Security chapter 17

19 Copyright © 2003 Pearson Education, Inc. Slide 16-19 PRIVACY: WHOSE INFORMATION IS IT? > How Could the Information Be Used? > Modern Devices and Privacy > Controlling the Use of Information

20 Copyright © 2003 Pearson Education, Inc. Slide 16-20 Figure 17.1. Voluntary Compliance Report Card. Fewer than a tenth of.com Web sites gathering personal information as of March 1999 posted a privacy statement that included five of the Fair Information Practices components. Source: Mary Culnan, Georgetown Internet Privacy Policy Survey, 1999.

21 Copyright © 2003 Pearson Education, Inc. Slide 16-21 A PRIVACY DEFINITION > Threats to Privacy > Voluntary Disclosure

22 Copyright © 2003 Pearson Education, Inc. Slide 16-22 FAIR INFORMATION PRACTICES > Five HEW Fair Information Principles > OECD Fair Information Practices

23 Copyright © 2003 Pearson Education, Inc. Slide 16-23 Five HEW Fair Information Principles – Health Education and Welfare > There must be no personal data record-keeping systems whose existence is secret > There must be a way for a person to find out about information on record and use > There must be a way for a person to prevent info used for one purpose to be used for another > There must be a way for the person to correct or amend their informaiton > Any organization creating maintaining or disseminating records must ensure the reliability of the data…

24 Copyright © 2003 Pearson Education, Inc. Slide 16-24 OECD Fair Information Practices > Organization of Economic Cooperation and Development > Limited Collection principle > Quality principle > Purpose principle > Use limitation principle > Security principle > Openness principle > Paricipation principle — Do I want to participate or not > Accountability principle. > Data Controller – person or office that sets policy regarding information.

25 Copyright © 2003 Pearson Education, Inc. Slide 16-25 COMPARING PRIVACY ACROSS THE ATLANTIC > U.S. Laws Protecting Privacy — Privacy Act of 1974 but realize Patriot Act supercedes in some aspects – governmental regulation — US regulates by business sector > Privacy Principles: European Union

26 Copyright © 2003 Pearson Education, Inc. Slide 16-26 THE COOKIE MONSTER > Sharing Cookies > Third-Party Cookies > Managing Your Privacy

27 Copyright © 2003 Pearson Education, Inc. Slide 16-27 Protecting your computer against unwanted invasion > Ads > Spy bots > Other malicious programs

28 Copyright © 2003 Pearson Education, Inc. Slide 16-28 Easiest > Restricted user account — dis – cannot easily download. Must go to admin account for any kind of program installation and download — But…it is also hard for mal-ware to infect your computer > Keep OS up to date > Keep Web browsers up to date > Restrict what can/cannot be done through web

29 Copyright © 2003 Pearson Education, Inc. Slide 16-29 RUNSAFE – Common sense approaches to safety > JMU recommendations for safety on your home computer. > http://www.jmu.edu/computing/security /startsafe/startsafe-home.shtml http://www.jmu.edu/computing/security /startsafe/startsafe-home.shtml > http://www.jmu.edu/computing/runsafe/

30 Copyright © 2003 Pearson Education, Inc. Slide 16-30 Last Chapters > Explore the ideas of “creativity” and computers > Discuss the Universality Principle — Any task you can perform on one computer you can perform on another — Basic tasks: Add, Subtract, Test, Load, Store, and Branch > Continuing to learn.


Download ppt "Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities."

Similar presentations


Ads by Google