Uploaded by tsunayoshi sawada

EE 518 modules (2)

advertisement
MODULE IN
INFORMATION TECHNOLOGY
EE 518
ELECTRICAL ENGINEERING DEPARTMENT
SCHOOL OF ENGINEERING AND ARCHITECTURE
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
1
form
or by of
any
means,
otherwise
of anydistributing,
part of this uploading
document,orwithout
prior or
written
permission
of form or by any
Property
and
for theelectronic,
exclusive mechanical,
use of SLU. photocopying,
Reproduction, recording,
storing in aorretrieval
system,
postingthe
online,
transmitting
in any
SLU,
is strictly
prohibited.
means,
electronic,
mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
EE 518
COURSE LEARNING OUTCOMES
Courtesy of communication technology wevio.com
Courtesy of Cyber Security Dept. facebook.com
The course EE 518: Information
technology prepares you as a future
engineer, to demonstrate all the
intended learning outcomes of the twounit course as per the Commission on
Higher
Education
(CHED)
Memorandum Orders (CMO) for your
respective degree program. In this
course, you will see how information
systems provide the foundation for
business. In each module, you will learn
information systems in the context of
business so that you will readily grasp
the idea and concepts presented.
At the end of the module, you should
be able to:
1. Know
the
fundamentals
Information Technology
INFORMATION
TECHNOLOGY
of
2. Interpret data and databases
3. Identify the IT needs of a company
4. Develop
design
system
analysis
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
and
2
TABLE OF CONTENTS
Page
TITLE PAGE
...............................................................................................................
MODULE AND UNIT TOPICS
2
...................................................................................
5
MODULE 1: Information Technologies in the Modern Organization .................
5
MODULE 2: Data management and databases ................................................
5
MODULE 3: Components of a telecommunications system ..............................
5
MODULE 4: Electronic Commerce and Electronic Business ...............................
5
MODULE 5: Technical View of System Analysis and Design ..............................
5
MODULE 6: Ethics, Impacts and security ............................................................
5
MODULE 7: The internet and the World Wide Web .............................................
6
COURSE STUDY GUIDE
...........................................................................................
6
....................................................................................................
8
...........................................................................................................
12
STUDY SCHEDULE
EVALUATION
.
FORMATIVE ASSESSMENT ACTIVITIES
........................................................
12
.
SUMMATIVE ASSESSMENT ACTIVITIES
........................................................
13
TECHNOLOGICAL TOOLS ...........................................................................................
14
CONTACT INFORMATION OF THE FACILITATOR
15
..................................................
MODULE CONTENT:
MODULE 1: INFORMATION TECHNOLOGY IN THE MODERN WORLD
................
18
...........................................
27
MODULE 3: E- COMMERCE AND E-BUSINESS
.......................................................
38
MODULE 4: TELECOMMUNICATIONS SYSTEM
......................................................
48
MODULE 5: INFORMATION SYSTEM DEVELOPMENT ...............................................
59
MODULE 6: ETHICS, IMPACTS AND SECURITY ........................................................
66
MODULE 7: INTERNET AND THE WORLD WIDE WEB ...............................................
73
MODULE 2: DATA MANAGEMENT AND DATABASES
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
3
Insert related picture or quote here
(adjust size and borders depending on the text
below)
Courtesy of Information Technology: Tool for development: lithoprobe.ca
COURSE INTRODUCTION
This course will provide a broad overview of how information technology (IT) impacts
organizational characteristics and outcomes. It will be discussed here the principal
performance enhancing benefits of IT, information efficiencies and information synergies,
and identify the main organizational outcomes of the application of IT that embody these
benefits. It will also be discussed here the role that IT plays in moderating the relationship
between organizational characteristics and interorganizational relationships and the most
strategic outcomes, organizational efficiency and innovation. Throughout the course, it will
be discussed here the limitations and possible negative consequences of the use of IT.
COURSE GUIDE
A. Module and Unit Topics
To ensure that you will demonstrate the above cited course learning outcome at the end of
the semester, this course designed to be delivered in 36 contact hours was structured into
seven modules. Each module contains topic learning outcomes and topic outline. Each
module contains activities designed using the 5E constructivist model of learning, developed
by Rodger Bybee, that encourages students to engage, explore, explain, elaborate, and
evaluate their learning of topics covered therein. This means that at the end of each
module, and the course as a whole, you will be assessed on your progress in attaining the
course learning outcomes. Outcomes based education dictates that only when you can
clearly demonstrate the course learning outcomes by the end of this course, can you be
given a passing mark. The modules that form the building blocks to help you attain the
course learning outcomes are as follows:
MODULE 1: Information Technologies in the Modern Organization.
The reasons for the widespread use of computer technology in business can best be
determined by looking at how it is being used across the business world. This module will
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
4
describe the organization/business in the digital economy. It will also describe Information
Technologies in the modern organization and strategic information systems.
MODULE 2: Data management and databases
Organizations require technology solutions to maintain, secure, manage, and process the
data stored in databases. This is where Database Management System come into play. This
module will discuss management of organizational data and information. It will also discuss
the modern approach of databases, database management systems and logical data
models.
MODULE 3: Components of a telecommunications system
Telecommunication is an important tool for businesses. It enables companies to
communicate effectively with customers and deliver high standards of customer service. This
module will discuss the telecommunications system, network services, network protocols,
network processing and types of computer networks.
MODULE 4: Electronic Commerce and Electronic Business
E-business and E-commerce are terms that are often used interchangeably. But e-business
and e-commerce are not the same. This module will elaborate on the differences between
the two and some of the foundational knowledge that is critical to understanding and using
e-commerce in particular.
MODULE 5: Technical View of System Analysis and Design
The process done by a larger organizational setting is facilitated by introducing a new sociotechnical information system or modifying or expanding an existing one. ISD includes subactivities of analysis, design, development, implementation, and evaluation. This module will
discuss alternative methods and tools for systems and component- based development.
MODULE 6: Ethics, Impacts and Security
The way an information technology tool affects sensitive issues has a direct impact on its
effectiveness and usability. It may be difficult for users and stakeholders to adopt a computer
system if they feel that its use violates important values and interests. This module will discuss
on impacts of IT on organizations and jobs, ethical Issues and protecting of information
resources.
MODULE 7: The Internet and the World Wide Web
An intranet is a private network, operated by a large company or other organization, which
uses internet technologies, but is insulated from the global internet. An extranet is an intranet
that is accessible to some people from outside the company, or possibly shared by more
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
5
than one organization. This module will further discuss the difference among Internet,
Intranets and extranets.
COURSE STUDY GUIDE
Finishing this course successfully relies heavily on your self-discipline and time management
skills. The course modules were prepared for you to learn diligently, intelligently, and
independently. Keeping yourself motivated to follow the schedules specified in the learning
plan, maintaining excellence in the expected student outputs, and mastering the different
technologies and procedures required in the delivery and feedback for this course, will instill
in you important qualities you will need in the future as an engineer practicing your
profession. The following course guides and house rules are designed for you to practice
decorum consistent with standards expected within a formal academic environment. These
guides shall lay the groundwork for consistency, coherence, cooperation, and clear
communication among learners and instructors throughout the conduct of this course:
1.
2.
MANAGE YOUR MINUTES. Create a study routine and stick to it. Keep
requirement deadlines and study schedules always in mind by providing visual
cues posted in your place of study or listed in your reminders (electronically,
online, or on paper). Remember that there are other daily activities that take
up your time, not to mention other courses you may be concurrently taking.
Choose a time of day when you are most likely to maximize learning.
Communicate your schedule to other members of your household so they could
help you keep it. It would also help to prepare a dedicated space in your
residence conducive for learning.
MIND YOUR MANNERS. Treat the distance learning environment as an
academic space not too different from a physical classroom. Do not do in the
distance learning environment, acts you would not normally do in a face-toface classroom set up. Avoid asking questions that have already been
answered in the lessons or in the instructions previously discussed or provided.
This reflects your poor focus and uninspired preparation for this course. Practice
Electronic Conversation Etiquette in group chats, open forums, and similar
electronic venues.
a. Use appropriate language and tone, correct grammar and spelling,
and complete sentences acceptable in an academic forum. Avoid
text-speak, slang, and all caps in your posts.
b. Express your opinions politely and do not dominate the conversation.
c. Avoid lengthy as well as offensive posts by sticking to the topic of the
discussion.
d. Take time to understand the salient points of the discussion, and
provide a meaningful and well-thought response to the posts of other
participants.
e. For a live meeting or video/voice conferencing set-up, mute
your microphone when you are not speaking to keep the focus
on the main speaker.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
6
3.
4.
5.
6.
7.
8.
9.
MASTER THE MEDIUM. The distance learning courses will be delivered making
use of the institutional Google Suite account of Saint Louis University. It would
be worthwhile on your part to devote some time and effort to learn the
applications you will need to access your course materials, interact with me and
your classmates, and submit course requirements. Applications of note are
Google Classroom, Google Drive, and Google Meet. There are also available
alternatives to Microsoft Office tools you might want to explore. Certain
requirements will require you to take a video on your smart phone, save it, and
submit it electronically. Work on this skill as well. If you are offline, identify the
most convenient means for express mail correspondence and inform me as
early as possible so we can make the necessary arrangements ahead of time.
MAKE MASTERPIECES. Go beyond minimum requirements. The course learning
outcomes will serve as a guide to the minimum expected competencies you
are to acquire at the end of this course. It does not limit you from performing
beyond it. Keep in mind that the quality of your work reflects the amount of
thought and care you put into the process of completing it. It provides a very
tangible measure of how much of the competencies you have developed and
fully obtained throughout this course.
CONNECT CONSTANTLY. There are more than sufficient online and offline
modes to ensure that you are well informed and provided on time with the
needed learning materials, instructions, requirements, and feedback either from
me or from your classmates. Exhaust all means possible to keep in touch and
updated. My contact details can be found at the latter part of this document
and will be made available and widely disseminated to enrolees of this course.
OBSERVE ORIGINALITY. Your course outputs will largely be submitted in
electronic form. It is going to have a highly traceable and comparable digital
footprint that can be easily checked for originality. Cite your sources properly
for referenced statements you decide to use in your own work. Attribute
statements by persons other than you by using terms like according to, he
said/she said, and the like.
INSTIGATE INDEPENDENCE. You are the focus of this course. Nobody else. All
assessment and evaluation tools in this course are designed to measure your
competence and not anybody else’s. You may use all resources at your
disposal and ask other people for advice. In the end however, it is going to be
your independent work that will be judged against the standards set for this
course. The only way for you to maximize this course to your advantage is to
learn as much from it as an individual. Make it count.
RESPECT THE ROUTINE. There are traditionally respected routines we follow in the
conduct of our everyday lives. Please be mindful of universally accepted norms
of courtesy attached to regular schedules of personal and family time. Unless
of utmost importance, please refrain from any form of communication between
8:30 PM and 7:30 AM everyday and the whole day on Sundays and official
holidays. You shall expect me to adhere to this guideline myself. This will allow
us all to dedicate personal time and space to other aspects of our life and
maintain a healthy work-life/study-life balance.
FINISH THE FIVE. To be able to help you build your own understanding from
experience and new ideas, the modules in this course are designed based on
the 5E Instructional Model (Engage, Explore, Explain, Elaborate, and Evaluate).
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
7
The following icons will help you find some of the most critical areas in the units
of the learning modules:
Additional Guidelines for Offline Students:
•
•
•
If you are a student opting for the offline mode of distance learning, you will
be tasked to send back the accomplished requirements at given stages of
the course through express mail correspondence on or before the scheduled
date to me. Make sure you will follow it up with me through text or any other
media available for you.
While waiting for my feedback of your accomplished requirements, continue
doing the task in the succeeding units of the module.
If needed, do not hesitate to keep in touch with me through any available
means. Remember, if there is a will, there is a way.
STUDY SCHEDULE
Below is the complete weekly schedule for the attainment of the topic learning outcomes
vis-a-vis the activities. This contains also the schedule of the deadlines of the submission of
the accomplished course requirements or assignments and the examination.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
8
Dates
MODULE 1
TOPIC LEARNING OUTCOMES
ACTIVITIES
Information Technologies in the Modern Organization
NOV 11-14
2020
TLO 1: Describe Information
Technologies in the Modern
Organization
Nov 15, 2020
Module 1 Evaluative Assessment
Graded Quiz
Data management and databases
TLO 2: Discuss data and
Engage: open forum: managing
database management
organizational
data and information
Explore: Database and data
management in the internet
Explain: Readings on:
a. The modern approach of
database
b. Database management
systems
c. Logical data models
MODULE 2
Nov 16-20,
2020
Engage: Overview on basic
fundaments of computers
through applications of
information technology
Explore: Readings on Information
Technology concepts and
management in the internet
Explain: Readings on:
a. The organization in the digital
economy
b. Strategic Information Systems
Elaborate:
Importance of information
technology in organizations that
would enable all personnel to
solve increasingly complex
problems in the business.
Evaluate: Module 1 evaluative
assessment (graded quiz)
Elaborate: Database and
examples, use of database, types
of database management
Evaluate: Module 1 evaluative
assessment (graded quiz)
Nov 21, 2020
MODULE 3
Nov 22-26,
2020
Module 2 Evaluative Assessment
Graded Quiz
Components of a telecommunications system
TLO 3: Describe the
Engage: Review of the basic
components of a
components of a
telecommunications system
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
9
telecommunication networks and
key networking technologies.
Explore: Readings on network
services, network protocols
network processing,
types of computer networks
Explain: Functions of
telecommunication, how does a
telecommunication work, scope
of telecommunication network,
telecommunication links
Elaborate: Network topologies,
communications Protocols in
computer Networks,
interconnections among
Networks
Evaluate: Module 3 evaluative
assessment (graded quiz)
Nov 27-28,
2020
MODULE 4
Nov 29Dec 2, 2020
Module 3 Evaluative Assessment
Graded Quiz
Electronic Commerce and Electronic Business
TLO 4: Describe Electronic
Engage: Site the key differences
Commerce and Electronic
between e-commerce and eBusiness
business
Explore: E-commerce and ebusiness support services in
internet
Explain: Business-to-consumer
applications, B2B applications,
business-to–employees, eGovernment and consumer-toconsumer EC
Elaborate: E-Commerce v/s EBusiness: difference, importance,
solutions and services
Evaluate: Module 4 Evaluative
Assessment (Graded Quiz)
Dec 3-4, 2020
Module 1, Module 2, Module 3, Module 4 Evaluative Assessment
Graded Midterm Examination
Technical view of System Analysis and Design
TLO 5: Discuss information
Engage: Open forum: What is
system development
meant by system development?
MODULE 5
Dec 5-8, 2020
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
10
Explore: Alternative methods and
tools for systems and componentbased development in the
internet
Explain: Agile Development, Enduser development, prototyping,
Integrated computer-assisted
software engineering (ICASE),
component-based development,
Object-oriented (OO)
development,
Elaborate: Typical stages of
information system development
process
Evaluate: Module 5 Evaluative
Assessment (Graded Quiz)
MODULE 6
Dec 9-13,
2020
Ethics, Impacts and security
TLO 6: Discuss Ethics, Impacts
and security
Dec 14, 2020
Module 6 Evaluative Assessment
Graded Quiz
The internet and world wide web
TLO 7: Differentiate among
Internet, Intranets and
Networks
MODULE 7
Dec 15-18,
2020
Engage: Readings on ethical
issues, impacts and protecting
information resources
Explore: Lecture/Readings
on Impacts of IT on organizations
and jobs
Explain: Discussion on information
technology ethics
Elaborate: Security issues in
information technology
Evaluate: Module 7 Evaluative
Assessment (Graded Quiz)
Presentation of final requirement
(term paper)
Engage: Open Forum: How does
the internet work?
Explore: Lecture/Readings on
Internet, intranet and networks
Explain: Follow-up Open Forum:
How does the internet work?
Elaborate: Differentiation of
internet, intranet and networks
Evaluate: Module 7 Evaluative
Assessment (Graded Quiz),
Presentation of final requirement
(term paper)
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
11
Dec 19, 2020
Dec 20, 2020
Dec 21, 2020
Module 7 Evaluative Assessment Graded Quiz
Submission of Final requirement (term paper)
Module 5 module 6 module 7 Evaluative assessment
Final Examination
Evaluation
The course modules rely on formative and summative assessments to determine the
progress of your learning in each module. To obtain a passing grade in this course, you
must:
1. Read all course readings and answer the pre-assessment quizzes, self-assessment
activities, and reflection questions.
2. Submit all assignments and graded quizzes
3. Take the Midterm Examination
4. Submit the term paper as the final requirement
5. Take the Final Examination.
•
If you are a student under the offline DL mode, accomplish all print-based and
electronically saved discussion activities and requirements, and submit them on
time via express mail correspondence.
Formative Assessment Activities
Formative assessments for this course are applied to ungraded activities that are used to
monitor your learning experience and provide feedback to improve both your learning
approach as well as my instructional approach.
•
•
•
•
•
•
You are required to answer the pre-assessment quizzes, self-assessment activities,
and reflection questions but your scores in activities will not be included in the
computation of your final grade.
The reflection questions are designed to help you to critically analyze the course
readings for better understanding while the pre-assessment quizzes and selfassessment activities are designed as a review management tool to prepare you
for the graded quizzes and examinations.
Successfully answering formative activity questions and requirements will serve as
prompts to tell you if you need to study further or if you may already move forward
to the next unit of the module.
The completeness of your answers to the pre-assessment quizzes, self-assessment
activities, and reflection questions will still be checked and will still be part of your
course completion. Hence, all pre-assessment quizzes, self-assessment activities,
and reflection questions must be answered.
In doing your formative assessment activities, you can always ask the help of your
family and friends.
The pre-assessment quizzes, self-assessment activities, and reflection questions are
required so you can take it anytime within the scheduled days assigned for each
unit.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
12
Summative Assessment Activities
The evaluative assessments are graded activities designed to determine if your
acquisition of learning and performance in tests is at par with standards set at certain
milestones in this course.
A. Quizzes, Examinations, and Assignments
Graded quizzes, examinations, and assignments are essential to determine
whether your performance as a student is at par with standards/goals that need
to be achieved in this course. The scores obtained from each of the graded
activities will contribute to your final grade, the weights of which are presented
in the grading system described in the succeeding sections of this text. Direct
scoring can be used on straightforward requirements like short answers and
multiple choice responses, while scoring rubrics will be provided for answers that
are typically lengthy and involve a more complex level of thinking on your part.
B. Final Course Requirement
To achieve the course learning outcome, a final examination is required.
Module 7 will provide you a summary of all the lessons covered in Modules 1
to 6. For online students, a copy of the final examination will be posted in
google classroom. For offline students, a saved copy in the USB flash drive will
be sent to them. They will answer it and send back the hard copy of solutions
to the instructor.
Technological Tools
To be able to accomplish all the tasks in this course, you will need a computer or a
laptop with the following software applications: Word Processing, Presentation, and
Publication for requirements that do not require online access. A smart phone with
video recording and editing features will also be used for activities that will require
you to record videos for saving and submission.
If you are a student online, access to the institutional Google Classroom will be
provided through your institutional account. An invitation to join the Google
Classroom will be sent to you through the SLU Student Portal and your institutional
email account, so make sure to activate your institutional email account. It is equally
important that you check your SLU Student Portal account at least twice a week and
turn your Gmail Notifications on your mobile phone and computer.
If you are a student offline, the delivery of instructions and requirements will be
primarily through express mail correspondence of printed modules and saved digital
content on a USB flash drive. Feedback and clarifications will be facilitated through
text messaging and voice calls; hence, you need to have regular access to a cell
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
13
phone. If you need to call, or you want to talk to me, send me a message first and
wait for me to respond. Do not give my CP number to anybody. I will not entertain
messages or calls from numbers that are not registered in my phone. Hence, use only
the CP number you submitted to me.
ASSIGNMENT GUIDE
I.
Output
You are expected to submit a complete requirement covering each module. You
should also submit a term paper as your final project at the end of this course.
II.
Rationale
Information technology has become a vital and integral part of every business. The
reasons for the omnipresent use of computer technology in business can best be
determined by looking at how it is being used across the business world. Devoting
enough thought to analyze and assess this assignment will help you understand the
impact of information technology historically on the organization and structure of the
modern corporation and how it will be applied to your future job as Electrical
engineers.
III. Materials
The assignment is available online in the Google Class materials and offline in the
saved electronic files in the USB flash drive and the printed learning materials. You
may consult all your reference materials and notes while doing this activity. You will
also need clean sheets of short bond paper and encode your thoughts on this activity.
IV. Specific Guidelines
•
•
•
•
•
•
Click on the link to the assignment under Module 1 in our Google Classroom.
Read all the instructions carefully before starting your thoughts and analysis.
Encode your work in a short bond paper.
No copying from your classmates. No copy- paste from the internet.
For the online submission of your paper, save it as pdf document saved under the file
name SURNAME, First Name.
Submit the pdf file of your requirement by uploading it to the online class.
V. Evaluation Tool
This assignment will gauge how you write clearly, concisely and precisely based on your
understanding on the materials given to you for reading. It will also measure your critical
thinking skills on different situations and how to analyze and solve business or
organizational problems on a broad scale using the modern technology.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
14
COURSE REFERENCES
Turban & Rainer (2002). Introduction to Information Technology (3rd ed). John Wiley & Sons,
Inc.
Stairs & Reynolds (2013). Principles of Information Technology Systems. Cengage Learning.
Gordon & Gordon (2003) Information Systems (3rd ed).
http://byteintobigdata.in/basic-elements-of-a-telecommunication-system/
Contact Information of the Facilitator
Engr. Sharon B. Resurreccion
EE 518 Course Facilitator
Cellphone
SLU local extension number
Institutional email address
: +639204973775/ +639561952540
: Electrical Engineering
: sbresurreccion@slu.edu.ph
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
15
EE 518: INFORMATION TECHNOLOGY
LEARNING MODULES
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
16
MODULE 1
Information Technologies in the
Modern Organization
This module will cover the concept of doing business in the digital economy which will discuss
the impact of digital technologies as the most important source of growth for national
economies. You will learn the different business pressures that organizations are facing today,
their organizational responses and how information technology supports these pressures. It
will also discuss competitive advantage and strategic Information showing Systems Porter’s
analysis tools: the value chain and the five forces model which examines the impact of the
Internet on business strategy. You will also learn various strategic information systems and
how it is being applied in every organization.
By the end of this module you should be able to:
TLO 1: Describe Information Technologies in the Modern Organization
LEARNING OUTCOMES: By the end of this module, you should be able to:
a. Describe The characteristics of the digital economy and e-business.
b. Discuss the relationships among business pressures, organizational responses,
and information systems.
c. Describe strategic information system and how information technology helps
companies improve their competitive positions.
d. Describe Porter’s competitive force model
e. Describe strategies that companies can use to achieve competitive
advantage in their industries.
Before you go on…
1. What is the difference between applications and computer- based
information systems?
2. Explain how the information systems provide support for knowledge
workers.
3. What are strategic information systems?
4. What are the capabilities of Information systems?
5. Why is it important to become knowledgeable about IT if you are not
working as an IT employee?
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
17
Doing Business in the Digital Economy
Concluding business in the digital economy using Web-based systems on the Internet and
other electronic networks.
Network Computing
•
e-business/ e-commerce the conducting of business functions (e.g., buying and
selling goods and services, servicing customers, collaborating with business partners)
electronically, in order to enhance an organization’s operations.
•
The infrastructure for e-business is network computing, which connects computers
and other electronic devices via telecommunication networks.
•
These computers may be connected to the global networked environment, known
as the internet, or to its counterpart within organizations, called an intranet, many
companies link their intranet to those of their business partners over networks called
extranets.
Information Technology
•
An organization’s collection of information resources, their users, and the
management that oversees them; includes the IT infrastructure and all other
information systems in an organization.
Figure 1: Architecture of an online travel agency
Figure 1: Architecture of an online travel agency
Information Technology (IT) architecture
•
It is a high level map or plan of the information assets in an organization. The IT
integrates the entire organizations business needs for information.
Information Technology (IT) infrastructure
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
18
•
It consists of the physical facilities, IT components, IT services, and IT personnel that
support the entire organization
Major Capabilities of Information System
a. Perform high-speed, high-volume, numerical computation.
b. Provide fast, accurate, and inexpensive communication within and between
organizations.
c. Automate both semiautomatic business processes and manual tasks.
d. Store huge amounts of information in an easy-to-access, yet small space.
e. Allow quick and inexpensive access to vast amount of information, worldwide.
f.
Facilitate the interpretation of vast amounts of data
g. Enable communication and collaboration anywhere, any time.
h. Increase the effectiveness and efficiency of people working in groups in one place
or in several locations, anywhere.
i.
Facilitate work in hazardous environment.
Digital Economy
•
An economy based on digital technologies, including communication networks (the
Internet, intranets, and extranets), computers, software, and other related
technologies; also, sometimes called the Internet economy, the new economy, or
the Web economy.
Digital networking and communications infrastructures includes:
•
A vast array of digitizable product -data bases, news and information, books,
magazines, TV and radio programming, movies, electronic games, musical CDs, and
software- which are delivered over the digital infrastructure anytime, anywhere in
the world
•
Consumers and firm conducting financial transaction digitally-through digital
currencies or financial tokens carried via networked computers and mobile devices
•
Physical goods such as home appliances and automobiles that are embedded with
microprocessors and networking capabilities.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
19
Business Model in the Digital Economy
•
The Internet is revolutionizing the economic, societal, and technological foundations
of the old economy. Organization are developing new models for business, the
economy, and government
Changing a linear supply chain to a hub
Figure 2
Business Model
•
A method of doing business by which a company can generate revenue to sustain
itself; spells out how the company adds value to its products or services.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
20
Five Representative Business Models of the Digital Age
1. Name- your- Own- Price: allow the buyer to state a price he or she is willing to pay
for a specific product or service.
2. Bidding Using Reverse Auctions: Via a request for quote, the buyer indicates a desire
to receive bids on a particular item, and would-be sellers bid on the job
3. Affiliate Marketing: Marketing partners place a banner ad for a company on their
Web site
4. Group Purchasing: The purchase orders of many buyers are aggregated, a small
business, or even an individual, can get a discount
5. E-Marketplace: Markets in which buyers and sellers negotiate online
Business Pressures, Organizational Responses, and IT Support
•
Business Pressure
➢ the business environment is the combination of social, legal, economic,
physical, and political factors that affect business activities. Significant
changes in any of these factors are likely to create business pressure on
organization.
➢ Three Types of business pressures that organizations face are market,
technology, and societal pressures.
IT support for organizational responses
Figure 3
The Three Types of Business Pressure
Market Pressure:
• The global economy and strong competition
• The changing nature of the workforce
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
21
•
Powerful customers.
Technology Pressures:
• Technological Innovation and Obsolescence
• Information Overload.
Societal Pressure:
• Social responsibility
• Government regulation and Deregulation
• Spending for social programs
• Protection Against Terrorist Attacks.
• Ethical Issues
Organizational Responses
Customer Relationship Management
•
An enterprise wide effort to acquire and retain customers, often supported by IT
Make- to- order
•
The strategy of producing customized products and services.
Mass customization
•
Production process in which items are produced in a large quantity but are
customized to fit the desires of each customers.
Virtual corporation
•
A business that operates through telecommunications networks, usually without a
permanent headquarters, to produce a product or service.
Competitive advantage and SIS
•
Competitive Advantage: An advantage over competitors in some measure such as
cost, quality, or speed, leads to control of a market and to larger- than average
profits.
Strategic Information Systems (SISs)
•
Systems that help an organization gain a competitive advantage through their
contribution to the strategic goals of an organization and /or their ability to
significantly increase performance and productivity.
Competitive forces model
•
A business framework, devised by Michael Porter, for analysing competitiveness by
reorganization five major forces that could endanger a company’s position.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
22
Porter’s five forces Model
Porter’s five forces Model
1. The threat of entry of new competitors- the threat of new competitor entry is high when it
is easy to enter your market and low when significant barriers to entry exist. An entry barrier
is a product or service feature that customers have learned to expect from organizations in
a certain industry.
2. The bargaining power of suppliers- supplier power is high when buyers have few choices
from whom to buy and low when buyers have many choices.
3. The bargaining power of customers (buyers)-Buyer power is high when buyers have many
choices from whom to buy and low when buyers have few choices.
4. The threat of substitute products or services-if there are many substitutes for an
organization’s products or services, then the threat is high. If there are few substitutes, then
the threat is low.
5. The rivalry among existing firms in the industry- the threat from rivalry is high when there is
intense competition among firms in an industry. The threat is low when the competition is
among fewer firms and is not intense.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
23
Answer the following questions in the Google Classroom Discussion Forum:
1. What is the importance of information technology in organizations?
2. How does Information Technology enable all personnel to solve increasingly
complex problems in the business?
Multiple choice: Read each question and choose the ONE best answer.
1. The pressures on organizations at the beginning of the twenty-first century include
all of the following except ____________.
A.
need for real-time operations
B.
customer orientation
C.
social responsibility
D.
lack of information
2. The purpose of a strategic system is to ____________.
A.
provide customers more attention from organizations
B.
provide organizations with continuous improvement effects
C.
begin the process of business reengineering
D.
provide organizations with strategic advantages in meeting
organizational objectives
3. All of the following are organizational responses to business pressures in the
information age except __________.
A.
continuous improvement efforts
B.
empowerment of management for all business decisions
C.
electronic commerce
D.
business process reengineering
4. People should learn about Information Technology because __________.
A.
the demand for traditional information technology staff is huge
B.
there are small numbers of well-paid IT opportunities appearing
C.
both a and b
D.
both a and c
5. A(n) __________ collects, processes, stores, analyzes, and disseminates information
for a specific purpose.
A.
data warehouse
B.
electronic commerce system
C.
business processing center
D.
information system
6. Knowledge __________.
A.
B.
is the collecting and processing of information for a specific purpose
is raw facts or descriptions of things, events, activities, and transactions
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
24
C.
consists of information that has been organized and process to convey
understanding, experiences, accumulated learning, and expertise as it
applies to a current business problem or process
D.
is a collection of facts organized in some manner for understanding
7. Hardware, software, database, network, procedures, and people are basic
components of a __________.
A.
knowledge base
B.
transaction processing unit
C.
computer-based information system
D.
data mart
8. All of the following statements pertaining to Computer-based Information Systems
are true except _________.
A.
most information technologies are used alone
B.
CBIS uses computer technology to perform specific tasks
C.
basic components include hardware, software, people, networks, and
database
D.
CBIS provide a solution to a business problem
9. Information systems must be able to do all of the following except _________.
A.
provide large capacity, fast access storage
B.
increase information overload
C.
provide fast communications
D.
span boundaries
10. Which of the following is a general technological trend for IT?
A.
increased use of portable computing
B.
personal computers increase in price and are no more powerful
C.
the use of multimedia takes place in large corporations
D.
user interfaces are becoming more complex to use
E.
global position devices are used only for military purposes
•
For students who are offline, detailed instructions are provided in your offline printed
modules which will guide you in utilizing learning materials, performing learning
activities, accomplishing requirements, and formatting/ saving reports and outputs
for offline submission.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
25
MODULE 2
Managing Organizational Data
and Information
In this module, you will that learn the different characteristics of database management. It
will be discussed that a Database Management System (DBMS) is a software that allows
creation, definition and manipulation of database, allowing users to store, process and
analyze data easily. DBMS provides an interface or a tool, to perform various operations like
creating database, storing data in it, updating data, creating tables in the database and a
lot more. DBMS also provides protection and security to the databases. It also maintains data
consistency in case of multiple users.
By the end of this module you should be able to:
TLO 2: Discuss data management and databases
LEARNING OUTCOMES: By the end of this module, you should be able to:
a. Discuss traditional data file organization and its problems.
b. Explain how a database approach overcomes the problems associated
with the traditional file environment.
c. Describe the three most common data models.
Before you go on…
1.
2.
3.
4.
What are some of the difficulties involved in managing data?
What are the various source of data?
Describe the data life cycle?
What are the advantages and disadvantages of database
management?
BASICS OF DATA ARRANGEMENT AND ACCESS
•
The Data Hierarchy: A bit (binary digit) represents the smallest unit of data a
computer can process (a 0 or a 1); a byte, represents a single character, which can
be a letter, a number, or a symbol.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
26
•
•
•
•
•
•
•
•
•
Field: A logical grouping of characters into a word, a small group of words, or a
complete number.
Record: A logical grouping of related fields.
File: A logical grouping of related records.
Database: A logical grouping of related files.
The Data Hierarchy: A bit (binary digit) represents the smallest unit of data a
computer can process (a 0 or a 1); a byte, represents a single character, which can
be a letter, a number, or a symbol.
Field: A logical grouping of characters into a word, a small group of words, or a
complete number.
Record: A logical grouping of related fields.
File: A logical grouping of related records.
Database: A logical grouping of related files.
THE TRADITIONAL FILE ENVIRONMENT
A data file is a collection of logically related records. In the traditional file management
environment, each application has a specific data file related to it, containing all the data
records needed by the application.
PROBLEMS WITH THE DATA FILE APPROACH
•
•
•
•
•
•
Data redundancy
Data inconsistency
Data isolation
Data security
Data integrity
Application/data independence
DATABASES: THE MODERN APPROACH
Database. A logical group of related files that stores data and the associations among
them.
CREATING THE DATABASE
To create a database, designers must develop a conceptual design and a physical design
•
•
•
•
•
•
•
Conceptual design: An abstract model of a database from the user or business
perspective.
Physical design: Layout that shows how a database is actually arranged on storage
devices.
Entity-relationship modeling: The process of designing a database by organizing
data entities to be used and identifying the relationships among them.
Entity-relationship (ER) diagram: Document that shows data entities and attributes
and relationships among them.
Entity classes: A grouping of entities of a given type.
Instance: A particular entity within an entity class.
Identifier: An attribute that identifies an entity instance.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
27
Relationships: The conceptual linking of entities in a database.
The number of entities in a relationship is the degree of the relationship. Relationships
between two items are common and are called binary relationships.
There are three types of binary relationships:
•
•
➢ In a 1:1 (one-to-one) relationship, a single-entity instance of one type is
related to a single-entity instance of another type.
➢ In a 1: M (one-to-many) relationship, a single-entity instance of one
type is related to many-entity instance of another type.
➢ In a M:M (many-to-many) relationship, a single-entity instance of one
type is related to many-entity of another type and vice versa.
Entity- relationship diagram model
Normalization
A method for analyzing and reducing a relational database to its most streamlined form for
minimum redundancy, maximum data integrity, and best processing performance.
Non-normalized relation
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
28
Normalized relation
DATABASE MANAGEMENT SYSTEMS
Database management system (DBMS): The software program (or group of programs) that
provides access to a database.
What is DBMS?
Database Management System (DBMS) refers to the technology solution used to optimize
and manage the storage and retrieval of data from databases. DBMS offers a systematic
approach to manage databases via an interface for users as well as workloads accessing
the databases via apps. The management responsibilities for DBMS encompass information
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
29
within the databases, the processes applied to databases (such as access and
modification), and the database’s logic structure. DBMS also facilitates additional
administrative operations such as change management, disaster recovery, compliance,
and performance monitoring, among others.
In order to facilitate these functions, DBMS has the following key components:
•
Software. DBMS is primarily a software system that can be considered as a
management console or an interface to interact with and manage databases. The
interfacing also spreads across real-world physical systems that contribute data to the
backend databases. The OS, networking software, and the hardware infrastructure is
involved in creating, accessing, managing, and processing the databases.
•
Data. DBMS contains operational data, access to database records and metadata
as a resource to perform the necessary functionality. The data may include files with
such as index files, administrative information, and data dictionaries used to represent
data flows, ownership, structure, and relationships to other records or objects.
•
Procedures. While not a part of the DBMS software, procedures can be considered as
instructions on using DBMS. The documented guidelines assist users in designing,
modifying, managing, and processing databases.
•
Database languages. These are components of the DBMS used to access, modify,
store, and retrieve data items from databases; specify database schema; control user
access; and perform other associated database management operations. Types of
DBMS languages include Data Definition Language (DDL), Data Manipulation
Language (DML), Database Access Language (DAL) and Data Control Language
(DCL).
•
Query processor. As a fundamental component of the DBMS, the query processor
acts as an intermediary between users and the DBMS data engine in order to
communicate query requests. When users enter an instruction in SQL language, the
command is executed from the high-level language instruction to a low-level
language that the underlying machine can understand and process to perform the
appropriate DBMS functionality. In addition to instruction parsing and translation, the
query processor also optimizes queries to ensure fast processing and accurate results.
•
Runtime database manager. A centralized management component of DBMS that
handles functionality associated with runtime data, which is commonly used for
context-based database access. This component checks for user authorization to
request the query; processes the approved queries; devises an optimal strategy for
query execution; supports concurrency so that multiple users can simultaneously work
on same databases; and ensures integrity of data recorded into the databases.
•
Database manager. Unlike the runtime database manager that handles queries and
data at runtime, the database manager performs DBMS functionality associated with
the data within databases. Database manager allows a set of commands to perform
different DBMS operations that include creating, deleting, backup, restoring, cloning,
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
30
and other database maintenance tasks. The database manager may also be used
to update the database with patches from vendors.
•
Database engine. This is the core software component within the DBMS solution that
performs the core functions associated with data storage and retrieval. A database
engine is also accessible via APIs that allow users or apps to create, read, write, and
delete records in databases.
•
Reporting. The report generator extracts useful information from DBMS files and
displays it in structured format based on defined specifications. This information may
be used for further analysis, decision making, or business intelligence.
Logical versus Physical View
➢ Physical view: The plan for the actual, physical arrangement and location of data in
the direct access storage devices (DASDs) of a database management system.
➢ Logical view: The user’s view of the data and the software programs that process
that data in a database management system.
DBMS Components
•
•
•
•
•
•
•
•
Data model: Definition of the way data in a DBMS are conceptually structured.
Data definition language (DDL): Set of statements that describe a database
structure (all record types and data set types).
Schema: The logical description of the entire database and the listing of all the data
items and the relationships among them.
Subschema: The specific set of data from the database that is required by each
application.
Data manipulation language (DML): Instructions used with higher-level programming
languages to query the contents of the database, store or update information, and
develop database applications.
Structured query language (SQL): Popular relational database language that
enables users to perform complicated searches with relatively simple instructions.
query by example (QBE): Database language that enables the user to fill out a grid
(form) to construct a sample or description of the data wanted.
data dictionary Collection: definitions of data elements, data characteristics that
use the data elements, and the individuals, business functions, applications, and
reports that use this data element.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
31
LOGICAL DATA MODELS
•
The three most common data models are hierarchical, network, and relational.
Other types of data models include multidimensional, object-relational,
hypermedia, embedded, and virtual
•
Hierarchical and network DBMSs: usually tie related data together through linked
lists. Relational and multidimensional DBMSs relate data through information
contained in the data.
Hierarchical Database Model
•
Hierarchical database model rigidly structures data into an inverted “tree” in which
each record contains two elements, a single root or master field, often called a key,
and a variable number of subordinate fields.
•
The strongest advantage of the hierarchical database approach is the speed and
efficiency with which it can be searched for data.
•
The hierarchical model does have problems: Access to data in this model is
predefined by the database administrator before the programs that access the data
are written. Programmers must follow the hierarchy established by the data structure.
Hierarchical Database model
Network Database Model
•
Data model that creates relationships among data in which subordinate records can
be linked to more than one data element.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
32
Relational Database Model
•
Data model based on the simple concept of tables in order to capitalize on
characteristics of rows and columns of data.
•
Relations: The tables of rows and columns used in a relational database.
•
Tuple: A row of data in the relational database model.
•
Attribute: A column of data in the relational database model.
Three basic operations of a relational database:
1. “Select” operation: creates a subset consisting of all file records that meet
stated criteria.
2. “Join” operation: combines relational tables.
3. “Project” operation: creates a subset consisting of columns in a table,
permitting the user to create new tables that contain only the information
required.
Advantages and Disadvantages of Logical Data Models:
Model
Advantages
Disadvantages
Hierarchical
database
Searching is fast and
efficient.
Access to data is predefined by
exclusively hierarchical relationships,
predetermined by
administrator. Limited search/query
flexibility. Not all data are naturally
hierarchical.
Network
Many more relationships
can be defined. There is
greater speed and
efficiency than with
relational database
models.
This is the most complicated database
model to design, Implement, and
maintain.Greater query flexibility than
withhierarchical model, but less than
with relational model.
Relational
database
Conceptual simplicity;
there are no predefined
relationships among data.
High flexibility in ad-hoc
querying. New data
and
records can be
added easily.
Processing efficiency and speed are
lower. Data redundancy is common,
requiring additional maintenance.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
33
Emerging Data Models
•
Two emerging data models are the object-relational and hypermedia models
o Object-relational database model: Data model that adds new object storage
capabilities to relational databases.
o Hypermedia database model: Data model that stores chunks of information in
nodes that can contain data in a variety of media; users can branch to related
data in any kind of relationship.
Specialized Database Models
a. Geographical information database: Data model that contains locational data for
overlaying on maps or images.
b. Knowledge database: Data model that can store decision rules that can be used for
expert decision making.
c. Small-footprint database: The subset of a larger database provided for field workers.
d. Embedded database: A database built into devices or into applications; designed to
be self-sufficient and to require little or no administration.
e. Virtual database: A database that consists only of software; manages data that can
physically reside anywhere on the network and in a variety of formats.
Benefits of DBMS
DBMS was designed to solve the fundamental problems associated with storing, managing,
accessing, securing, and auditing data in traditional file systems. Traditional database
applications were developed on top of the databases, which led to challenges such as
data redundancy, isolation, integrity constraints, and difficulty managing data access. A
layer of abstraction was required between users or apps and the databases at a physical
and logical level.
Introducing DBMS software to manage databases results in the following benefits:
• Data security. DBMS allows organizations to enforce policies that enable compliance
•
•
•
•
and security. The databases are available for appropriate users according to
organizational policies. The DBMS system is also responsible to maintain optimum
performance of querying operations while ensuring the validity, security and consistency
of data items updated to a database.
Data sharing. Fast and efficient collaboration between users.
Data access and auditing. Controlled access to databases. Logging associated access
activities allows organizations to audit for security and compliance.
Data integration. Instead of operating island of database resources, a single interface is
used to manage databases with logical and physical relationships.
Abstraction and independence. Organizations can change the physical schema of
database systems without necessitating changes to the logical schema that govern
database relationships. As a result, organizations can upgrade storage and scale the
infrastructure without impacting database operations. Similarly, changes to the logical
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
34
schema can be applied without altering the apps and services that access the
databases.
• Uniform management and administration. A single console interface to perform basic
administrative tasks makes the job easier for database admins and IT users.
For data-driven business organizations, DBMS can turn into extremely complex technology
solutions that may require dedicated resources and in-house expertise. The size, cost and
performance of a DBMS varies with the system architecture and use cases, and should
therefore be evaluated accordingly. Also, a DBMS failure can incur significant losses to
organizations that fail to maintain optimal functionality of a DBMS system.
Readings: Database and examples, use of database, types of database managementpp. 111-120 of reference book Introduction to Information System by Rainer and Turban
Watch this video: https://www.guru99.com/what-is-dbms.html
Multiple choice: Read each question and choose the ONE best answer.
1. From the smallest unit to the largest unit of data, which is the correct data
hierarchy ____________?
A.
byte, field, bit, file, record, database
B.
database, file, record, field, byte, bit
C.
byte, bit, field, record, database
D.
bit, byte, field, record, file, database
2. A logical group of related records is called a ____________.
A.
database
B.
byte
C.
bit
D.
file
3. Problems with the traditional file system include all of the following except
__________.
A.
direct file access
B.
data redundancy
C.
data isolation
D.
data inconsistency
4. A database is a collection of related files and is generally __________ or __________.
A. distributed or partitioned
B. centralized or distributed
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
35
C. replicated or centralized
D. distributed or replicated
5. To create a database, designers must develop a __________ and a __________.
A. entity relationship, physical design
B.
conceptual design, physical design
C. ER diagram, relationship design
D. conceptual design, ER diagram
6. Three types of binary relationships are __________.
A.
1:1 relationship
B.
1:M relationship
C.
M:M relationship
D. all of the above
7. In a DBMS there can be __________ physical view(s) and __________ logical view(s).
A.
many, many
B.
one, one
C.
one, many
D.
many, one
8. _________ databases have no predefined relationships among data and provide
high flexibility in ad hoc querying.
A.
multi-dimensional
B.
network
C.
relational
D.
hierarchical
9. A _________ is a relational or multi-dimensional database management system
designed to support management decision making.
A.
data warehouse
B.
data mart
C.
metadata model
D.
knowledge database
10. __________ helps organizations find hidden contents of documents including useful
relationships.
A. data mining
B.
relationship mining
C. data warehouses
D. text mining
•
For students who are offline, detailed instructions are provided in your offline printed
modules which will guide you in utilizing learning materials, performing learning
activities, accomplishing requirements, and formatting/ saving reports and outputs
for offline submission.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
36
MODULE 3
Components of Telecommunications
System
This module will provide you the basic understanding of concepts and principles of
telecommunication systems which includes the basic types of communication media, major
types of network services, ethernet and TCP/IP protocols. It will also be discussed here the
data communication concepts and techniques in a layered network architecture, types of
communication, network congestion, network configuration, network model components,
layered network and network topologies.
By the end of this module you should be able to:
TLO 3: Describe the components of a telecommunications system
LEARNING OUTCOMES: By the end of this module you should be able to:
a. Understand the basic telecommunications system.
b. Describe the eight basic types of communications media, including their
advantages and disadvantages.
c. Describe the major types of network services.
d. Describe the Ethernet and TCP/IP protocols.
e. Differentiate between client/server computing and peer-to-peer
computing
Before you go on…
1. Describe the components of the basic telecommunication system.
2. What are the implications of having fiber-optic cable in everyone’s home?
3. What are the implications of Bit Torrent for the music industry? For the motion
picture?
Telecommunication is an important tool for businesses. It enables companies to
communicate effectively with customers and deliver high standards of customer service.
In its most fundamental form, a telecommunication system includes a transmitter to take
information and convert it to a signal, a transmission medium to carry the signal and a
receiver to take the signal and convert it back into usable information. This applies to any
communication system, whether it uses computers or not. This module will further discuss
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
37
the telecommunications system, network services, network protocols, network processing
and types of computer networks.
The telecommunications system
•
•
•
Telecommunications system: Combination of hardware and software that
transmits information (text, data, graphics, and voice) from one location to
another.
Analog signal: Continuous waves that transmit information by altering the
amplitude and frequency of the waves.
Digital signal: A discrete pulse, either on or off, that conveys information in a
binary form.
Basic element of telecommunication system
Transmitter
Transmitter (information source) that takes information and converts it to a signal for
transmission. In electronics and telecommunications, a transmitter or radio transmitter is an
electronic device which, with the aid of an antenna, produces radio waves. In addition
to their use in broadcasting, transmitters are necessary component parts of many
electronic devices that communicate by radio, such as cell phones
Transmission medium
Transmission medium over which the signal is transmitted. For example, the transmission
medium for sounds is usually air, but solids and liquids may also act as transmission media
for sound. Many transmission media are used as communications channel. One of the
most common physical medias used in networking is copper wire. Copper wire to carry
signals to long distances using relatively low amounts of power. Another example of a
physical medium is optical fiber, which has emerged as the most commonly used
transmission medium for long-distance communications. Optical fiber is a thin strand of
glass that guides light along its length. The absence of a material medium in vacuum may
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
38
also constitute a transmission medium for electromagnetic waves such as light and radio
waves.
Receiver (radio)
Receiver (information sink) that receives and converts the signal back into required
information. In radio communications, a radio receiver is an electronic device that
receives radio waves and converts the information carried by them to a usable form. It is
used with an antenna. The information produced by the receiver may be in the form of
sound (an audio signal), images (a video signal) or digital data.
Wired communication
Wired communications make use of underground communications cables (less often,
overhead lines), electronic signal amplifiers (repeaters) inserted into connecting cables at
specified points, and terminal apparatus of various types, depending on the type of wired
communications used.
Wireless
Wireless communication involves the transmission of information over a distance without
help of wires, cables or any other forms of electrical conductors. Wireless operations permit
services, such as long-range communications, that are impossible or impractical to
implement with the use of wires. The term is commonly used in the telecommunications
industry to refer to telecommunications systems (e.g. radio transmitters and receivers,
remote controls etc.) which use some form of energy (e.g. radio waves, acoustic energy,
etc.) to transfer information without the use of wires. Information is transferred in this
manner over both short and long distances.
Components of a Telecommunication System
In its most fundamental form, a telecommunication system includes a
transmitter to take information and convert it to a signal, a transmission medium
to carry the signal and a receiver to take the signal and convert it back into
usable information. This applies to any communication system, whether it uses
computers or not.
1. Input and output devices, also referred to as 'terminals'
These provide the starting and stopping points of all communication. A
telephone is an example of a terminal. In computer networks, these devices are
commonly referred to as 'nodes' and consist of computer and peripheral
devices.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
39
2. Telecommunication channels, which transmit and receive data
This includes various types of cables and wireless radio frequencies.
3. Telecommunication processors, which provide a number of control and
support functions
For example, in many systems, data needs to be converted from analog to
digital and back.
4. Control software, which is responsible for controlling the functionality and
activities of the network
5. Messages represent the actual data that is being transmitted
In the case of a telephone network, the messages would consist of audio as
well as data.
6. Protocols specify how each type of telecommunication systems handle the
messages
Other major components of a telecommunications system:
Hardware
Communication media
Communication networks
Communication software
Data communication dividers
Communication providers
Communication protocols
Communication protocols
Communications processors
➢ Hardware devices that support data transmission and reception across a
telecommunications system.
➢ Modem: Device that converts signals from analog to digital and vice versa.
➢ Multiplexer: Electronic device that allows a single communications channel
to carry data transmission simultaneously from many sources.
➢ Front-end processor: A small secondary computer, dedicated solely to
communication, that manages all routing communications with peripheral
devices.
Communication media and channels
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
40
❖ Communication channel: Pathway for communicating data form one
location to another.
❖ Cable media: Communications channels that use physical wires or cables
to transmit data and information.
❖ Broadcast (wireless) media: Communication channels that use
electromagnetic media (the ‘’airwaves’’) to transmit data.
❖ Twisted-pairs wire: copper wire twisted together in pairs used for most
business telephone wiring.
❖ Coaxial cable. Insulated copper wire; used to carry high-speed data traffic
and television signals.
❖ Fibber- optic cable. Thousands of very thin filaments of glass fibers,
surround by cladding, that transmit information via light pulses generated
by lasers.
❖ Microwave transmission. Communication channel that uses towers to send
wireless signals; used for high-volume, long-distance, point-to-point
communication.
❖ Satellite transmission. Communications channel that uses orbiting satellites
to send digital transmission point-to-point.
❖ Propagation delay. Brief pause between the sending and receipt of a
satellite transmission.
❖ Global positioning system (GPS). A wireless system that uses satellites to
enable users to determine their position anywhere on the earth.
❖ Radio transmission. Communications channel that uses radio wave
frequencies to send data directly between transmitters and receivers over
short distances.
❖ Satellite radio (digital radio). Form of radio transmission that offers
uninterrupted, near CD-quality music beamed to your radio from space.
❖ Cellular radio technology. Use of radio transmission between cells in
geographic service areas and a mobile telephone switching office,
enabling wireless phone service.
❖ Personal communication services (PCS) technology. Wireless
communication technology that uses lower-power, higher-frequency radio
waves than cellular radio technology, making PCS devices effective in
places where cellular devices are not.
❖ Infrared. Red light not commonly visible to human eyes; can be modulated
or pulsed for conveying information.
❖ Bandwidth. The range of frequencies available in a communications
channel stated in bits per second.
Network Services
▪
Computer network. A system connecting communications media, hardware, and
software needed of two or more computer systems and/ or devices.
▪
Switched lined. Telephone lines through which data transmissions can be routed
or switched to their destination.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
41
▪
Dedicated lines (leased lines). telephone line that provide a constant connection
between two devices and require no switching or dialling.
▪
Integrated services digital network (ISDN). A high-speed technology that allows
users to transfer voice, video, image, and data simultaneously, over existing
telephone lines.
▪
Digital subscriber line (DSL). A high-speed, digital data-transmission technology
using existing analog telephone lines.
▪
Integrated services digital network (ISDN). A high-speed technology that allows
users to transfer voice, video, image, and data simultaneously, over existing
telephone lines.
▪
Digital subscriber line (DSL). A high-speed, digital data-transmission technology
using existing analog telephone lines.
▪
Integrated services digital network (ISDN). A high-speed technology that allows
users to transfer voice, video, image, and data simultaneously, over existing
telephone lines.
▪
Digital subscriber line (DSL). A high-speed, digital data-transmission technology
using existing analog telephone lines.
▪
Integrated services digital network (ISDN). A high-speed technology that allows
users to transfer voice, video, image, and data simultaneously, over existing
telephone lines.
▪
Digital subscriber line (DSL). A high-speed, digital data-transmission technology
using existing analog telephone lines.
Network protocols
•
Gigabit Ethernet. The most common network protocol in large corporations,
which provides data transmission speeds of one billion bits per second.
•
Transmission control protocol / internet protocol (TCP/IP). A file transfer protocol
that can send large files of information across sometimes- unreliable networks with
assurance that the data will arrive uncorrupted.
The International Standards Organization open systems interconnection protocol
(ISO-OSI)
The ISO-OSI model defines how software on different system communicates at
different layers. The model has seven layers, each having its own well-defined
function.
Layer 1: physical layer: define the mechanism for communicating with the
transmission media and interface hardware.
Layer 2: data link layer: validates the integrity of the flow of data.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
42
Layer 3. network layer: defines the protocols for data routing to ensure that
information arrives at the correct destination
Layer 4: transport layer: defines the protocols for structuring messages.
Layer 5: session layer : coordinates communications and maintains the session for
as long as needed including security and log-on functions.
Layer 6: presentation layer; defines the way data is formatted, converted and
encoded
Layer7: application layer. Defines the way that applications programs such as email interact with the network
Network processing strategies
•
Distributed processing. Network architecture that divides processing work
between two or more computers, linked together in a network.
•
Client/ server computing. Form of distributed processing in which some machines
(servers) perform computing functions for end –user PCs (clients).
•
Peer- to–peer processing. A type of client/ server distributed processing that
allows two or more computers to pool their resources, making each computer
both a client and a server
Types of computer networks
•
Local area network (LAN). Network that connects communications devices in a
limited geographical region (e.g., a building), so that every user device on the
network can communicate with every other device.
•
Topology. The physical layout and connectivity of a network
LAN technology
•
File server. A repository of various software and data files for the network, which
determines who gets access to what and in what sequence
•
Network interface card. Hardware that specifics the data transmission rate, the
size of message units, the addressing information attached to each message and
network topology.
•
Gateway. A communications processor that connects dissimilar networks by
translating from one set of protocols to another
•
Bridge. A communications processor that connects two networks of the same
type.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
43
•
Router. A communications processor that routes message through several
connected LANs or to a wide area network.
Wireless local area networks (WLANs)
•
WLANs: Technologies (e.g., Bluetooth and wifi) that provide LAN
connectivity over short distance, typically limited to less than 150 meters.
•
Bluetooth. A wireless technology that enables temporary, short-range
connection between wireless devices and enables these devices to
communicate with each other via low-power radio frequencies.
•
Wi-Fi (Wireless Fidelity). A wireless technology that can transmit information
at a range up to 300 feet; another name for the 802.11b standard on
which most WLANs run.
•
Private branch exchange (PBX). a type of LAN that controls telephone
switching at a company site.
Wide area networks (WAN)
•
A network generally is provided by a common telecommunications carrier, that
covers a wide geographic area.
•
Value-added network (VAN). A private, data-only network that is managed by an
outside third party and used by multiple organizations to obtain economies in the
cost of network service and network management.
•
A network generally is provided by a common telecommunications carrier, that
covers a wide geographic area.
•
Value-added network (VAN). A private, data-only network that is managed by an
outside third party and used by multiple organizations to obtain economies in the
cost of network service and network management.
Enterprise Networking
Interconnected multiple LANs and WANs.
Answer the following questions in the Google Classroom Discussion Forum
1. Describe and contrast the three wireline communication channels.
2. What is the difference between LANs and WANs?
3. Describe the Ethernet and TCP/ IP protocols.
4. Describe an enterprise network.
5. Compare and contrast the ATM, SONET, and T-carrier systems.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
44
A. Multiple choice: Choose the letter representing the correct answer to each quiz
question below.
1. The major components of a telecommunications system include all of the following
except ____________.
A.
hardware
B.
communication media
C.
communication software
D.
applications software
2. ____________ __________ include twisted-pair wire, coaxial cable, fiber optic cable,
and microwave transmission.
A.
communications media
B.
communications networks
C.
communication channels
D.
communication protocols
3. A __________ _________ consists of communications media, devices, and software
needed to connect two or more computer systems and/or devices.
A.
computer database
B.
local area protocol
C.
wireless network
D.
computer network
4. Basic network topologies include all of the following except __________.
A.
star
B.
diamond
C.
ring
D.
hierarchical
5. Functions that communications software provides include all of the following except
__________.
A.
internet access
B.
error checking
C.
communication logs
D.
data security and privacy
6. The most widely known communication reference model, which has 7 layers, is
known as the __________.
A.
TCP/IP model
B.
ethernet model
C.
OSI model
D.
network model
7. __________ __________ __________ are often used to boost local area networks.
A.
asynchronous transfer mode
B.
switched hub technologies
C.
synchronous transfer mode
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
45
D.
t-carrier system
8. _________ architecture links two or more computers in an arrangement in which
some machines perform computing functions for end-user PCs.
A.
terminal/host
B.
distributed presentation
C.
distributed processing
D.
client/server
9. The most commonly used telecommunications application is _________.
A.
electronic mail
B.
video conferencing
C.
facsimile
D.
electronic funds transfer
10. __________ is the electronic transmission of routine repetitive business documents
directly between the computer systems of separate companies doing business with
each other.
A.
ATM
B.
EDI
C.
EFT
D.
E-mail
•
For students who are offline, detailed instructions are provided in your offline printed
modules which will guide you in utilizing learning materials, performing learning
activities, accomplishing requirements, and formatting/ saving reports and outputs
for offline submission.
MODULE 4
E-Commerce and E-Business
E-commerce and E-business are the two popular networks being used nowadays particularly
on online shopping that has gained fame in the last few years. Now, if you want to buy
something, you do not need to walk all the way to the store. With just a smartphone and
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
46
internet connection, you can buy anything you want, from any place in this world. This
module will discuss the different types of E-commerce and the different types E-business. It
will also discuss the difference of the two since most people think those two terms have a
similar meaning.
By the end of the module the students should be able to:
TLO 4: Describe Electronics Commerce and Electronics Business
LEARNING OUTCOME: By the end of the module the students should be able to:
a. Describe electronic commerce, its scope, benefits, limitations, and types.
b. Understand the basics of how online auction and bartering work.
c. Describe the major applications of business-to-consumer commerce, including
service industries, and the major issues faced by e-tailers.
d. Describe business-to-business applications.
e. Describe e-government activities and consumer-to-consumer e-commerce
f. Describe the e-commerce support services, specifically payments and logistics.
g. Discuss some ethical and legal issues relating to e-commerce
Before you go on…
1. Discuss various types of online services.
2. Describe online advertising, its methods and its benefits.
3. What are spamming, permission marketing, and viral marketing?
Overview of E-Business and E-Commerce
•
•
Electronic commerce (e-commerce, EC). The process of buying, selling,
transferring, or exchanging products, services, and/or information via computer
networks, including the Internet.
E-business. A broader definition of EC, including buying and selling of goods and
services, and also servicing customers collaborating e-learning, and conducting
electronic transactions within an organization.
Pure versus partial EC
•
•
Electronic commerce can take several forms depending on the degree of
digitization- the transformation from physical to digital- involved. The degree of
digitization can relate to:(1) the product (service) sold, (2) the process, or (3) the
delivery agent (or intermediary).
In pure EC all dimensions are digital.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
47
•
•
If there is at least one digital dimension, we consider the situation partial EC.
Brick- and-mortar organizations. Organization in which the product, the process, and
the delivery agent are all physical.
Types of E-Commerce Transactions
• Business-to-Business (B2B): E-commerce in which both the sellers and the buyers are
business organizations.
• Collaborative commerce (c-commerce): E –commerce in which business partners
collaborate electronically
• Business-to-Consumers (B2C): E-commerce in which the seller are organizations and
the buyers are individual also known as e-tailing.
• Consumer-to-Consumer(C2C). E-commerce in which an individual sells products or
services to other individuals.
• Customer -to-Business (C2B). E-commerce in which customers make known a
particular need for a product or service, and suppliers complete to provide the
product or service to consumers.
• Intrabusiness(intraorganizational) commerce. E-commerce in which an organization
uses EC internally to improve its operations.
• B2E (business to employees) EC: A special case of intrabusiness e-commerce in
which an organization delivers product or services to its employees.
• Government–to–Citizens(G2C): E-commerce in which a government provide
services to its citizen via EC technologies.
• Government-to–business (G2B): E-commerce in which a government does business
with other governments as well as with businesses.
• Mobile Commerce (m-commerce): E-commerce conducted in a wireless
environment.
EC Business Model
•
The major business model of EC are summarized in Manager’s Checklist 5.1
•
Business Model. The method by which a company generates revenues to sustain
itself.
The Scope of EC
•
EC applications are supported by an infrastructure that includes hardware,
software, and networks, ranging from browsers to multimedia, and also by five
support areas.
•
•
•
•
•
People
Public Policy
Marketing and advertising
Support services
Business Partnerships
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
48
Benefits of E-commerce
Benefits to organization:
• The availability of natural and international markets,
• The decreased cost of processing, distributing, and retrieving information.
Benefit to customer:
• The access to a vast number of products and services, around the clock.
Benefit to society:
• The ability to deliver information, services, and product to people in cities, in rural
areas and in developing countries.
Technological Limitations
•
•
•
The lack of universally accepted security standards.
Insufficient telecommunication bandwidth.
Expensive accessibility
Nontechnological Limitations
• A perception that EC is insecure.
• Unresolved legal issue.
• A lack of a critical mass of sellers and buyers.
A framework for e-commerce
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
49
Major EC Mechanism
•
The major mechanisms for buying and selling on the Internet are electronic
catalogs. Electronic auctions, and online bartering
•
Electronic Catalogs. Electronic catalogs on CD-ROM and the Internet have gained
popularity. Electronic catalogs consist of a product database, directory and search
capabilities and a presentation function.
•
Electronic Auctions (E-auction). A market mechanism by which sellers place offers
and buyers make sequential bids, and prices are determined dynamically by
competitive bidding.
•
Electronic battering. The exchange of goods or services without a monetary
transaction.
Electronic catalogs can be classified according to three dimension:
•
The dynamic of the information presentation.
•
The degree of customization.
•
The degree of integration with other business process or features.
Types of Electronic Auctions:
•
Forward auction: An auction that sellers use as a selling channel to many potential
buyers; the highest bidder wins the item.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
50
•
Reverse auction: An auction in which one buyer, usually an organization, seeks to
buy a product or a service, and suppliers submit bids; most common model for large
purchase.
5.3 Business-to-Consumer Applications
Electronic relating (e-tailing): The direct sale of products and services through
electronic storefronts or electronic malls, usually designed around an electronic
catalog format and/or auctions.
• Two popular shopping location online are electronic storefronts and electronic
malls:
o Electronic storefront: The website of a single company, with its own Internet
address, at which orders can be placed.
o Electronic malls (cyber mall): A collection of individual shops under one
Internet address.
• Cyberbanking. Various banking activities conducted electronically from home, a
business, or on the road instead of at a physical bank location.
• Virtual bank. A banking institution dedicated solely to internet transactions.
•
Phases in Customer Service Life Cycle.
• Phase 1: Requirement: Assist the customer to determine needs by providing
photographs of a product, video presentation, textual descriptions, articles or
reviews, sound bites on a CD, and downloadable demonstration files.
• Phase 2: Acquisition: Help the customer to acquire a product or service.
• Phase 3: Ownership: Support the customer on an ongoing basis
• Phase 4: Retirement: Help the client to dispose of a service or product.
Issues in E-tailing
•
Resolving channel conflict
•
Resolving conflicts within click–and-mortar organizations
•
Organizing order fulfilment and logistics.
•
Determining viability and risk of online e-tailers.
•
Identifying appropriate revenue models
5.4 Online Advertising
•
Improves traditional forms of advertising in a number of ways:
o can be updated any time at minimal cost
o can reach very large numbers of potential buyers all over the world
o sometimes cheaper
o can be interactive and targeted to specific interest groups and / or to
individuals.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
51
It makes sense to move advertising to the Internet, where the number of
viewers is growing.
Shortcomings: most of which relate to the difficulty in measuring the effectiveness
and cost-justification of the ads.
o
•
Advertising Method
•
Banners: Electronic billboards, which typically contain a short text or graphical
message to promote a product or a vendor.
•
Keyword banner: Banner advertising that appears when a predetermined word is
queried from a search engine.
•
Random banner: Banner advertising that appears randomly.
•
Pop-up ad: An advertisement that is automatically launched by some trigger and
appears underneath the active window.
Some Advertising Issues and Approaches
•
Unsolicited Advertising: Spamming is the indiscriminate distribution of electronic ads
without permission of the receiver.
•
Permission marketing: Method of marketing that asks consumers to give their
permission to voluntarily accept online advertising and e-mail.
•
Viral Marketing: Virtual marketing refer to online “word-of-mouth” marketing. The
main idea is to have people forward message to friends, suggesting that they
‘’check this out’’
•
Interactive Advertising and Marketing: The term interactive points it the ability to an
individual, to gather and remember that person’s responses, and to serve that
customer based on his or her previous unique responses.
Online Promotions: Attracting Visitors to a site.
•
Making the top of the list of search engine.
•
Online events, promotion and attractions.
•
Online coupons.
5.5 B2B Applications
•
In business to business (B2B) applications, the buyers, sellers, and transactions involve
only organizations
•
The major models are: sell-side marketplaces, buy-side marketplaces, and
electronic exchanges.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
52
Major B2B Models
•
Sell-side marketplace. B2B model in which organizations sell to other organizations
from their own private e-marketplace and/or from a third-party site
•
Buy-side marketplace. B2B model in which organizations buy needed products or
service from other organizations electronically often through a reverse auction.
•
E-procurement. Purchasing by using electronic support.
Sell-Side Marketplaces
The key mechanisms in the sell–side model are:
• Electronic catalogs that can be customized for each large buyer and
• Forward auctions.
Buy-Side Marketplaces
•
Group Purchasing: The aggregation of purchasing orders from many buyers so that
a volume discount can be obtained.
•
Desktop Purchasing: E-procurement method in which supplier’s catalogs are
aggregated into an internal master catalog on the buyer’s server for use by the
company’s purchasing agents.
Four Types of Electronic Exchanges
•
Public exchanges (exchanges): E-marketplace in which there are many sellers and
many buyers, and entry is open to all; Frequently owned and operated by a third
party. Four basic types:
•
Vertical distributors for direct materials
•
Vertical exchanges for indirect materials.
•
Horizontal distributors
•
Functional exchanges
5.6 Intrabusiness and Business-to-Employees
•
Intrabusiness. E- commerce within an organization (between an organization and its
employees or among business units).
•
Business to its Employees (B2E) commerce
•
E-commerce between and among units within the business
•
E-commerce between and among corporate Employees.
5.7 E-Government and Consumer-to-Consumer EC
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
53
•
E-government. The use of e-commerce to deliver information and public services to
citizens, business partners and suppliers of government entities, and those working in
public sector.
•
E-government application can be divided into three major categories; governmentto-citizens (G2C), government–to–business (G2B), and government-to–government
(G2G).
Customer-to-Consumer(C2C)
•
E-commerce in which both the buyer and the seller are individuals (not businesses).
5.8
•
C2C auctions
•
Classified Ads.
•
Personal Services.
•
Support services to C2C
E-commerce support services
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
54
Electronic Payments
•
•
Electronic Checks
Electronic Credit Cards
•
Purchasing Cards
•
Electronic Cash
•
Electronic Bill Presentment and Payments
•
Paying Bills at ATMs.
Three forms of electronic cash
•
Person- to-Person Payment. A form of e-cash that enables the transfer of funds
between two individuals, or between an individual and a business, without the use
of a credit card.
•
Stored-value money card. A form of e-cash on which a fixed amount of prepaid
money is stored, the amount is reduced each time the card is used.
•
Smart card. A form of e-cards, that contains a microprocessor (chip) that enables
the card to store a considerable amount of information and to conduct processing.
Security in Electronic Payment
•
Authentication. The buyer, the seller, and the paying institution must be assured of
the identity of the parties with whom they are dealing.
•
integrity. It is necessary to ensure that data and information transmitted in EC, are
not accidentally or maliciously altered or destroyed during transmission.
•
Nonrepudiation. Merchants need protection against the customer’s unjustified
denial of placing an order. On the other hand, customers need protection against
merchant’s unjustified denial of payment made. (such denials, of both types, are
called repudiation)
•
Privacy. Many customers want their identify to be secured.
•
Safety. Customers want to be sure that it is safe to provide a credit card number on
the Internet.
Security Protection
•
E-wallets (digital wallets). Mechanisms that combine security measure and
convenience in EC purchasing.
•
Virtual credit card. A payment mechanism that allows a buyer to shop with an ID
number and a password instead of with a credit card number.
5.9 Ethical issues in e-business
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
55
•
Privacy
•
Loss of Jobs
•
One of the most interesting EC issues relating to loss of jobs is that of intermediation.
Intermediaries provide two types of services. (1) matching and providing information
and (2) value-added services such as consulting.
•
Disintermediation: Elimination of intermediaries in EC.
•
Reintermediation: Occurs where intermediaries such as brokers, who provide valueadded services and expertise, cannot be entirely eliminated from EC.
Legal Issues Specific to E-Commerce
•
Fraud on the internet
•
Domain names
•
Taxes and other fees.
•
Copyright
Tips for Safe Electronic Shopping
❑ Look for reliable brand names at sites like Wal-Mart online, and
Amazon.com. Before purchasing, make sure that the site is
authentic by entering the site directly and not from an unverified
link
❑ Search any unfamiliar selling site for the company’s
address and phone and fax numbers. Call up and quiz the
employee about the seller.
❑Check out the vendor with the local chamber of commerce or better business bureau
(bbbonline.org). Look for seals of authenticity such as TRUSTe.
❑ Investigate how secure the seller’s site is by examining the security procedure and by
reading the posted privacy notice
❑Examine the money- back guarantees, warranties, and service agreements.
❑ Compare price to those in regular stores. too.-low prices are too good to be true, and
some ‘’catch ‘’ is probably involved.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
56
❑ Ask friends what they know. Find testimonials and endorsements in community sites
and well –known bulletin boarder.
❑find out what your rights are in case of a dispute. Consult consumer protections
agencies and the national fraud information center (fraud.org)
❑check consumerworld.org for a listing of useful resources.
Answer the following questions in the Google Classroom Discussion Forum.
1. Discuss the major limitations of E-commerce. Which of these limitations are likely to
disappear?
2. Discuss the benefits to sellers and buyers of a B2B exchange.
3. Why is order fulfillment in B2C considered difficult?
Web Activities:
1. Access www. Realtor.com. Prepare a list of services available on this site. Then
prepare a list of advantages derived by the users and advantages to realtors. Are
there any disadvantages? To whom?
2. Enter www. campusfood.com. Explore this site. Why is the site so successful? Could
you start a competing one? Why or why not?
3. Enter www. alibaba.com. Identify the site’s capabilities. Look at the site’s private
trading room. Write a report. How can such a site help a person who is making a
purchase?
•
For students who are offline, detailed instructions are provided in your offline printed
modules which will guide you in utilizing learning materials, performing learning
activities, accomplishing requirements, and formatting/ saving reports and outputs for
offline submission.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
57
MODULE 5
Technical View of System Analysis
and Design
This module aims to study the organization’s strategic plan. You will also discuss about IT
architecture that enables users, applications, and databases to be seamlessly networked
and integrated. You will learn how to allocate IS development resources efficiently among
competing projects, so the projects can be completed on time, within budget, and have
required functionality. It will also give you an overview of the traditional Software
Development Life Cycle. Alternative methods and tools for systems development and
component- based development and web services will also be covered.
By the end of this module, you should be able to:
TLO5: Describe Information System Development, alternative methods and tools for
systems and component- based development
LEARNING OUTCOMES: By the end of this module, you should be able to:
a. Describe the hierarchy and steps of IT architecture.
b. Describe the SDLC and its advantages and limitations.
c. Describe the major alternative methods and tools for building information
systems.
d. Describe the use of component - based development and web services.
Before you go on…
1. Describe an IT architecture.
2. Discuss how to develop IT architecture.
3. Describe an IT infrastructure and its applications.
DEVELOPING AN IT ARCHITECTURE
Koontz (2000) suggested a six-step process for developing an IT architecture
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
58
•
•
•
•
•
•
Step 1: Business goals and vision. The system analyst reviews the relevant business
goals and vision.
Step 2: Information architecture. A company analyst defines the information
necessary to fulfil the objectives of step 1.
Step 3: Data architecture. What data you have and what you want to get form
customers, including Web-generated data.
Step 4: Application architecture. Define the components or modules of the
applications that will interface with the required data. Build the conceptual
framework of an application, but not the infrastructure that will support it.
Step 5: Technical architecture. Formally examine the specific hardware and
software required to support the analysis in previous step.
Step 6: Organizational architecture. An organizational architecture deals with the
human resources and procedure required by steps 1 through 5
OVERVIEW OF SDLC
•
Systems development life cycle (SDLC) is a structured framework used for large IT
projects, that consists of sequential processes by which information systems are
developed.
An eight- stage system development life cycle (SDLC)
o
o
o
o
Waterfall approach. SDLC approach in which tasks in one stage were
completed before the work proceeded to next stage
Systems analysts. IS professionals who specialize in analyzing and designing
information systems.
Programmers. IS professionals who modify existing computer programs or
write new computer programs to satisfy user requirements.
Technical specialist. Experts on a certain type of technology, such as
databases or telecommunications
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
59
SYSTEM STAKEHOLDERS
•
All people who are affected by changes in information systems
SYSTEMS INVESTIGATION
•
•
Systems investigation begins with the business problem (or business opportunity).
The next task in the systems investigation stage is the feasibility study that gauges
the probability of success of a proposed project and provides rough assessment
of the project's feasibility.
FEASIBILTY SUDY
•
•
Technical feasibility: Assessment of whether hardware, software and
communications components can be developed and /or acquired to solve a
business problem.
Economic feasibility: Assessment of whether a project is an acceptable financial
risk and if the organization can afford the expense and time needed to complete
it.
ECONOMIC FEASIBILITY
➢ Return on investment. The ratio of the net income attributable to a project divided
by the average assets invested in the project.
➢ Net present value. The net amount by which project benefits exceed project
costs of capital and the time value of money.
➢ Breakeven analysis. Method that determines the point at which the cumulative
cash flow from a project equals the investment made in the project.
•
•
Organizational feasibility: organization’s ability to access the proposed project.
Behavioural feasibility: Assessment of the human issues involved in a proposed
project, including resistance to change and skills and training needs.
SYSTEMS ANALYSIS
•
The examination of the business problem that the organization plans to solve with
an information system. This stage defines the business problem, identifies its
causes, specifies the solution and identifies the information requirements that the
solution must satisfy
➢ Organization have three basic solutions to any business problem relating to
an information system :
o Do nothing and continue to use the existing system unchanged,
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
60
o
o
Modify or enhance the existing system,
Develop a new system
There are problems associated with eliciting information requirement,
regardless of the method used by the analyst.
➢ The business problem may be poorly defined
➢ The users may not know exactly what the problem is, what they want or
what they need.
➢ Users may disagree with each other about business procedures or even
about the business problem.
➢ The problem may not be information related, but may require other
solutions, such as a change in management or additional training.
•
The system analysis stage produces the following information:
➢ Strengths and weaknesses of the existing system
➢ Functions that the new system must have to solve the business problem.
➢ User information requirements for the new system.
SYSTEMS DESIGN
•
•
System analysis describes what a system must do to solve the business problem
and systems design describes how the system will accomplish this task . The
deliverable of the systems design phase is the technical design that specifies
the following :
System outputs, inputs and user interfaces
•
Hardware, software, databases, telecommunications, personnel and
procedures
•
How these components are integrated. This output represents the set of system
specification
System design encompasses two major aspects of the new system :
➢ Logical system design: states what the system will do, using abstract
specifications.
➢ Physical system design: states how the system will perform its functions, with
actual physical specification.
PROGRAMMING
•
The translation of a system’s design specification into computer code.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
61
TESTING
•
•
Testing check to see if the computer code will produce the expected and
desired results under certain conditions
Testing is designed to delete errors (bugs) in the computer code. These errors are
of two types. Syntax errors ( e.g., misspelled word or a misplaced comma) and
logic errors that permit the program to run but result in incorrect output
IMPLEMENTATION
•
Implementation or deployment is the process of converting from the old system to
the new system. Organizations use four major conversion strategies; parallel ,
direct , pilot and phased.
➢ Parallel conversion. Implementation process in which the old system and the new
system operate simultaneously for a period of time.
➢ Direct conversion. Implementation process in which the old system is cut off and
the new system turned on at a certain point in time.
➢ Pilot conversion. Implementation process that introduces the new system in one
part of the organization on a trial basis, when new system is working property, it is
introduced in other parts of the organization.
➢ Phased conversion. Implementation process that introduces components of the
new system in stages, until the entire new system is operational.
OPERATION AND MAINTENANCE
•
Systems need several types of maintenance.
➢ Debugging: a process that continues throughout the life of the system.
➢ Updating: updating the system to accommodate changes in business
conditions.
➢ Maintenance: that adds new functionally to the system –adding new
features to the existing system without disturbing its operation.
ALTERNATIVE METHODS AND TOOLS FOR SYSTEMS DEVELOPMENT
•
•
•
•
•
Prototyping
Joint application design (JAD)
Rapid application development (RAD)
Object- oriented development
Other methods
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
62
•
•
•
•
•
•
Prototyping. Approach that defines an initial list of user requirements, builds a
prototype system and then improves the system in several iterations based on
users’ feedback.
Joint application design (JAD). A group –based tool for collecting user
requirements and creating system designs.
Rapid application development. A development method that uses special tools
and an iterative approach to rapidly produce a high-quality system.
Computer-aided software engineering (CASE). Development approach that uses
specialized tools to automate many of the tasks in the SDLC; upper CASE tools in
SDLC automate the early stages of the SDLC, and lower case tools automate the
later stages.
Integrated Computer Assisted software Engineering (ICASE) Tools . CASE tools that
provide links between upper CASE and lower CASE tools.
Object- oriented development. Begins with aspects of the real world that must
be modelled to perform a task.
COMPONENT-BASED DEVELOPMENT (CBD) AND WEB SERVICE
•
CBD: A method that uses pre-programmed components to develop application.
•
Web service in system development: Self-contained, self-describing business and
consumer modular applications, delivered over the Internet, that users can select
and combine through almost any device.
Web Services Advantages and Limitations
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
63
Watch video on system analysis design.
https://www.youtube.com/watch?v=pOzSlT2Chi0
The figure below shows a model for prototyping process.
1. Explain the flow until a particular project is completely done.
2. Discuss the advantage and disadvantages of prototyping.
3. When do you usually use prototyping method to analyze a project?
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
64
MODULE 6
Information Systems: Ethics, Privacy and
Security
The way an information technology tool affects sensitive issues has a direct impact on its
effectiveness and usability. It may be difficult for users and stakeholders to adopt a computer
system if they feel that its use violates important values and interests. This module will discuss
the impacts of IT on organizations and jobs, ethical Issues and protecting of information
resources, Impacts on individuals at work, societal impacts and Internet communities, IS
vulnerability and computer crimes.
By the end of this module you should be able to:
TLO6 : Discuss Ethics, Impacts and security
LEARNING OUTCOMES: By the end of this module you should be able to:
a. Describe the major ethical issues related to information technology and identify
situations in which they occur.
b. Identify the many threats to information security.
c. Understand the various defense mechanisms used to protect information systems.
d. Explain IT auditing and planning for disaster recovery.
Before you go on…
1. Describe the issue of privacy as it is affected by Information Technology.
2. What does a code of ethics contain?
3. Give an example of one type of unintentional threat to a computer system.
4. Describe the issue of intellectual property protection.
A. Ethical Issues
• Ethics. A branch of philosophy that deals with what is considered to be right and
wrong.
• Code of ethics. A collection of principles intended as a guide for the members of
company or an organization.
• Ethical issues can be categorized into four types:
1. Privacy
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
65
2. Accuracy
3. Property
4. Accessibility
Protecting Privacy
• Privacy. The right to be left alone and to be free of unreasonable personal intrusions
Two rules have been followed fairly closely in past court decision in many countries:
1. The right of privacy is not absolutes. Privacy must be balanced against the
needs of society
2. The public’s right to know is superior to the individual’s right of privacy.
• Electronic surveillance. The tracking of people‘s activities, online or offline, with the
aid of computers.
• Privacy policies/codes. An organization’s guidelines with respect to protecting the
privacy of customers, clients, and employees.
Protecting Intellectual Property
• Intellectual property. The intangible property created by individuals or corporations,
which is protected under trade secret, patent, and copyright, laws.
• Trade secret. Intellectual work such as a business plan, that is a company secret and
is not based on public information.
• Patent. A document that grants the holder exclusive rights on an invention or
process for 20 years.
• Copyright. A grant that provides the creator of intellectual property with ownership
of it for the life of the creator plus 70 years.
B. Impacts of IT on organizations and Jobs
• The use of information technologies, most recently the web, has brought many
organizational changes in areas such as structure, authority, power, job content,
employee career ladders, supervision and manager’s job.
How will organizations change?
• Fatter organization hierarchies.
• Changes in supervision.
• Power and status.
How will job change?
• Job content
• Employee career ladders
• The manager’s job
C. Impacts on Individuals at Work
• Will my job be eliminated?
• Dehumanization and psychological impacts
Dehumanization: Loss of identity
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
66
•
Information anxiety: Disquiet caused by an overload of information
Impacts on health and safety
Ergonomics: The science of adapting machines and work environment
to people.
Societal Impact and Internet Communities
• Opportunities for people with disabilities
• Quality-of-life improvements
• Technology and privacy
• The digital divide
• Free speech versus censorship
• Controlling spam
• Virtual communities
Technology and privacy
• Scanning crowds for criminals
• Cookies and individual privacy
• Digital millennium Copyright Act and Privacy
The Digital Divide
• The gap in computer technology in general, and now in web technology, between
those who have such technology and those who do not.
• Cybercafés: Public places in which Internet terminals are available usually for a
small fee.
Free speech versus censorship
• Controlling spam.
• Spamming. The practice of indiscriminately broadcasting message over the Internet.
Virtual communities
• Groups of people with similar interests who interact and communicate via the
Internet
A. IS Vulnerability and Computer Crimes
• Identity theft. Crime in which someone uses the personal information of
others to create a false identity and then uses it for some fraud.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
67
Security Terms
Type of computer crimes and criminals
• Hacker. An outside person who has penetrated a computer system, usually with no
criminal intent.
• Cracker. A malicious hacker.
• Social engineering. Getting around security systems by tricking computer users into
revealing sensitive information or gaining unauthorized access privileges.
• Cybercrimes. Illegal activities executed on the Internet.
• Identify theft. A criminal (the identity thief) poses as someone else.
• Cyberwar. War in which a country’s information systems could be paralyzed from a
massive attack by destructive software.
• Virus. Software that can attach itself to (‘’infect’’) other computer programs without
the owner of the program being aware of the infection.
Security Terms
Method
Definition
Virus
Secret instructions inserted into programs (or data) that are innocently
ordinary tasks. The secret instructions may destroy or alter data as well
as spread within or between computer systems
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
68
Worm
A program that replicates itself and penetrates a valid computer
system. It may spread within a network, penetrating all connected
computers.
Trojan
horse
An illegal program, contained within another program, that ‘’sleep'
until some specific event occurs then triggers the illegal program to be
activated and cause damage.
Salami
slicing
A program designed to siphon off small amounts of money from a
number of larger transactions, so the quantity taken is not readily
apparent.
Super
zapping
A method of using a utility ‘’zap’’ program that can bypass controls to
modify programs or data
Trap door
A technique that allows for breaking into a program code, making it
possible to insert additional instructions.
Logic
bomb
An instruction that triggers a delayed malicious act
Denial of
services
Too many requests for service, which crashes the site
Sniffer
A program that searches for passwords or content in packet of data as
they pass through the Internet
Spoofing
Faking an e-mail address or web-page to trick users to provide
information instructions
Password
cracker
A password that tries to guess passwords (can be very successful)
War
dialling
Programs that automatically dial thousands of telephone numbers in
an attempt to identify one authorized to make a connection with a
modem, then one can use that connection to break into databases
and systems
Back
doors
Invaders to a system create several entry points, even if you discover
and close one, they can still get in through others
Malicious
applets
Small Java programs that misuse your computer resource, modify your
file, send fake e-mail, etc
B.
•
•
•
•
Protecting Information Resources
Controls
Securing your PC
Concluding thoughts about computer
Auditing information systems
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
69
•
•
•
•
•
Disaster recovery planning
Disaster recovery. The chain of events linking planning to protection to recovery.
Disaster avoidance. A security approach oriented toward prevention.
Backup location. Location where, in the event of a major disaster, an extra copy of
data and/ or key programs are kept.
Hot site. Location at which vendors provide access to a fully configured backup
data center.
Web Activities:
1. Software piracy is a global problem. Access the following websites: www.
bsa.org and www.microsoft.com/piracy/. What can organizations do to
mitigate this problem? Are some organizations dealing with the problem better
than others?
2. Visit www.junkbusters.com and learn how to prohibit unsolicited e-mail (spam).
Describe how your privacy is protected.
Problem Solving Activity
An information security manager routinely monitored the Web surfing among her
company’s employees. She discovered that many employees were visiting the “sinful
six” Web sites. (Note: The sinful six are Websites with material related to pornography,
gambling, hate, illegal activities, tastelessness, and violence.) She then prepared a list
of the employees and their surfing histories and gave the list to management. Some
managers punished their employees. Some employee, in turn, objected to the
monitoring, claiming that they should have a right to privacy.
a. Is monitoring of Web surfing by managers ethical? (It is legal) Support your answer.
b. Is employee Web surfing on the “sinful six” ethical? Support your answer.
c. Is the security manager’s submission of the list of abusers to management ethical?
Why or why not?
d. Is punishing the abusers ethical? Why or why not? If yes, then what types of
punishment are acceptable?
e. What should the company do in order to rectify the situation?
•
For students who are offline, detailed instructions are provided in your offline printed
modules which will guide you in utilizing learning materials, performing learning
activities, accomplishing requirements, and formatting/ saving reports and outputs for
offline submission.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
70
MODULE 7
Internet and the World Wide Web
An intranet is a private network, operated by a large company or other organization, which
uses internet technologies, but is insulated from the global internet. An extranet is an intranet
that is accessible to some people from outside the company, or possibly shared by more
than one organization. This module will further discuss the evolution, operations, and services
of the internet, the segment of the Internet called the World Wide Web, organizational
applications of Internet technology (intranets and extranets) and specialized Internet
applications.
By the end of this module you should be able to :
TLO7: Differentiate among Internet, Intranets and Networks
LEARNING OUTCOMES: By the end of this module you should be able to:
1. Differentiate among the internet, the world wide web, intranets, and extranets.
2. Describe how the internet operates.
3. Discuss the various ways to connect to the internet.
4. Describe the parts of an internet address.
Before you go on…
1.
2.
3.
4.
5.
Describe the various ways that you can connect to the internet.
Describe the parts of an internet address.
What are the roles of browsers?
What is the difference between the internet and world wide web?
What is URL?
What is the Internet?
❖ The largest computer network in the world (a network of networks)
❖ Information exchange is seamless using open, non-proprietary standards and
protocols, within interconnected networks
❖ A true democratic communications forum producing a democratization of
information
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
71
❖ Spirit of information sharing and open access underlies the Internet.
The Internet Today
❖ The Internet is international, with users on all continents
❖ The cost of personal computers and Internet connections are prohibitively high for
most of the world’s population
❖ Political, cultural, and regulatory barriers have slowed the rate of Internet adoption
internationally
❖ The vast majority of sites are in English
❖ The vast majority of content is generated in the United States
The Infrastructure of the Internet
❖ Commercial communications companies are primary providers of the physical
network backbone of the Internet
❖ The U.S. government contributes some funds to essential administrative processes
❖ The Internet infrastructure is supplied by network service providers
❖ Connections between and flow of information between backbone providers has
been open and free of charge
Future Internet Initiatives
❖ Internet2
➢A collaboration among more than 180 U.S. universities to develop leadingedge networking and advanced applications for learning and research.
➢ A group of very high bandwidth networks on the Internet.
➢ Partnership between universities, industry, and government.
❖ Next Generation Internet (NGI)
➢ Federal government led initiative to advance Internet technology and
applications.
The Operation of the Internet
❖ Packets of information flow between machines governed by common rules
(protocols):
➢ Internet protocol (IP)
➢ Transport control protocol (TCP)
❖ Internet is a packet-switching network
➢ Messages are decomposed into packets, containing part of the message,
plus information on the sending and receiving machines and how the packet
relates to the other packets
➢ Packets travel independently and possibly on different routes through the
Internet
➢ Packets are reassembled into the message at the receiving machine.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
72
Each computer on the Internet is identified by an IP address
Most computers also have domain names
Network Solutions, Inc. had a monopoly on domain name registration until 1999.
Today, some 82 companies can register domain names.
Cybersquatting – purchase of domain name with intent to resell it. Legislative action
resulted in Nov. 2000
❖ New top-level domain zones: In November 2000, the first addition of a global toplevel domains to the Internet since the 1980s occurred.
➢ .aero (for the air-transport industry)
➢ .biz (for businesses)
➢ .coop (for cooperatives)
➢ .museum (for museums)
➢ .name (for individuals)
➢ .pro (for professions)
❖ Accessing the Internet
➢ Connect via LAN Server
➢ Connect via Serial Line Internet Protocol/Point Protocol (SLIP/PPP)
➢ Connect via an Online Service (AOL, MSN)
❖
❖
❖
❖
❖
Internet Services – Communications
❖ E-mail – electronic messaging
❖ USENET newsgroups – forums that collect groups of messages from users based on
common themes
❖ LISTSERV – distributes email messages to all subscribers
❖ Chatting – live, interactive, written conversations based on topic groups
❖ Instant messaging – instant text messaging between Internet users
❖ Telnet – user on one computer doing work on another computer
❖ Internet telephony – conducting voice conversations over the Internet
❖ Internet fax – real time document transmittal
❖ Streaming audio and video
Internet Services – Information Retrieval
❖ File Transfer Protocol (FTP) – electronic transfer of files from one computer to another
❖ Archie – tools to enable searching for files at FTP sites
❖ Gophers – menu-driven information search tool
❖ Veronica – text search through Gopher sites
❖ Wide Area Information Servers (WAIS) – database search tool
Internet Services – Web Services
❖ Delivery of software components via a web site rather than through traditional
means (disks, CDs)
❖ .NET – Microsoft’s new platform for XML Web services. Integrates web sites and
programs to deliver applications.
Internet Services – World Wide Web
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
73
❖ An application that uses the Internet transport functions
❖ A system with universally accepted standards for storing, retrieving, formatting, and
displaying information via a client/server architecture
❖ Based on HTML - standard hypertext language used in Web
❖ Handles text, hypermedia, graphics, and sound
The World Wide Web
❖ Home Page - a text and graphical screen display; first, introductory page in a web
site
❖ Web Site - all the pages of a company or individual
❖ Hyperlinks - ways to link and navigate around the pages on a web site
❖ Webmaster - the person in charge of a Web site
❖ Uniform Resource Locator (URL) - points to the address of a specific resource on the
Web
❖ Hypertext Transport Protocol (HTTP) - communications standard used to transfer
pages across the WWW portion of the Internet
❖ Browsers – graphical software that enables WWW users to request and view web
documents
❖ Offline Browsers – software that retrieves pages from Web sites automatically at
predetermined times
❖ Search Engines - programs that return a list of Web sites or pages that match some
user-selected criteria
❖ Metasearch Engines - automatically enter search queries into a number of other
search engines and return the results
❖ To be included in a search engine’s database
➢ Web Crawlers
➢ Registration
❖ Pull Technology - requires web user to actively request information; traditional web
mechanism
❖ Push Technology - automatically supplies desirable information to users
➢ provides timely, prioritized distribution of information over a corporate
network in the workplace
➢ enhances traditional Web advertising in the consumer market
➢ used for software delivery and updates
❖ Information Filters – automated methods of sorting/screening WWW content
❖ Clipping Services – automated retrieval of articles and news items from publications
❖ Personalized Web Services – ability to generate personalized Web content
❖ Web Authoring (for page and site design)
➢ Standard HTML is the common denominator
➢ CompuServe Graphics Interchange Format (GIF) and Joint Photographic
Experts Group (JPEG) is the common format of graphics files
➢ Browsers can be extended through software plug-ins
Internet Challenges
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
74
❖ New Technologies
➢ Adopted by vendors more rapidly than users and customers can implement
them
➢ Web developers cannot assume that users can run their innovations
successfully
❖ Internet Regulation
➢ Technical organizations (e.g., World Wide Web Consortium) develop
standards governing the Internet’s functionality
➢ These organizations are not formally charged in any legal or operational
sense with responsibility for the Internet
➢ How to control controversial content on the Web?
❖ Internet Expansion
➢ Tremendous Internet traffic growth has strained some elements of the
network
• Slower retrieval times
• Unreliable data transmission
• Denial of service by overloaded servers
➢ Approaches to overcoming this congestion include
• Improved hardware technology
• Improved Web management software
❖ Internet Privacy - Web sites collect information with and without consumers’
knowledge
➢ Cookie - small data file placed on users’ hard drives when a site is first visited.
Collects data on pages visited and content viewed.
➢ Three potential approaches to the privacy issue
• Government lets groups develop voluntary privacy standards; does
not take any action now unless real problems arise
• Government recommends privacy standards for the Internet; does not
pass laws at this time
• Government passes laws now for how personal information can be
collected and used on the Internet
➢ Financial transaction security also a concern
Intranets
❖ A private network that uses Internet software and TCP/IP protocols
➢ Provide employees with easy access to corporate information
➢ Used to deploy corporate applications
• Examples – policies and procedures manuals; human resource forms;
product catalogs
➢ Security is a concern
• Security measures include – public key security, encryption, digital
certificates, firewalls
Extranets
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
75
❖ An extension of an intranet to selected outside business partners, such as suppliers,
distributors, and key customers
➢ Provide business partners with easy access to corporate information and easy
collaboration
❖ Security
➢ Critical to prevent unwanted entry into internal systems
➢ Virtual private networks (VPNs) are often used to add security to Internet
communication
❖ Extranet configurations
➢ One company sets up an Extranet for its dealers, customers, or suppliers
➢ Companies within an industry set up a collaborative Extranet for mutual
benefit
➢ Several companies collaborate over an Extranet for joint venture
❖ Benefits include –
➢ Lower communication costs; better communication; improved order entry
and customer service; improvement in business effectiveness
Other Web-based Applications
❖ Enterprise Information Portals
➢ Users have single point of access to internal and external stored information
❖ Mobile Internet
➢ Use of wireless communication telecommunication devices to access Webbased applications
Summary
❖ Internet is a network of network
❖ Internet provides communication and information retrieval services, as well as the
World Wide Web
❖ The World Wide Web enables a huge variety of applications for businesses, including
intranets and extranets
❖ Many challenges exist when using the WWW, including congestion, privacy, and
security
Discussion Questions:
1. What is the world wide web and how does it differ from the internet? Why do so
many people equate the two terms?
2. Should the internet be regulated? If so, by whom?
3. Discuss the pros and cons of the internet.
4. Explain how the internet works. Assume you are talking to someone who has no
knowledge of information technology (in other words keep it very simple).
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
76
Web Exercises:
1. You want to set up your own Web site using your name for the domain name (for
example, JuanCruz)
a. Explain the process for registering a domain.
b. Which top-level domain will you use and why?
c. Access www.icann.org and obtain the name of an agency or
company that can register a domain for the TLD that you selected.
What is the name of the agency or company?
2. Access the Web site for the agency or company to learn the process that you
must use. How much will it initially cost to register your domain name? How much will
it cost to maintain that name in the future?
•
For students who are offline, detailed instructions are provided in your offline printed
modules which will guide you in utilizing learning materials, performing learning
activities, accomplishing requirements, and formatting/ saving reports and outputs for
offline submission.
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any
form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of
SLU, is strictly prohibited.
77
Download