MODULE IN INFORMATION TECHNOLOGY EE 518 ELECTRICAL ENGINEERING DEPARTMENT SCHOOL OF ENGINEERING AND ARCHITECTURE Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any 1 form or by of any means, otherwise of anydistributing, part of this uploading document,orwithout prior or written permission of form or by any Property and for theelectronic, exclusive mechanical, use of SLU. photocopying, Reproduction, recording, storing in aorretrieval system, postingthe online, transmitting in any SLU, is strictly prohibited. means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. EE 518 COURSE LEARNING OUTCOMES Courtesy of communication technology wevio.com Courtesy of Cyber Security Dept. facebook.com The course EE 518: Information technology prepares you as a future engineer, to demonstrate all the intended learning outcomes of the twounit course as per the Commission on Higher Education (CHED) Memorandum Orders (CMO) for your respective degree program. In this course, you will see how information systems provide the foundation for business. In each module, you will learn information systems in the context of business so that you will readily grasp the idea and concepts presented. At the end of the module, you should be able to: 1. Know the fundamentals Information Technology INFORMATION TECHNOLOGY of 2. Interpret data and databases 3. Identify the IT needs of a company 4. Develop design system analysis Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. and 2 TABLE OF CONTENTS Page TITLE PAGE ............................................................................................................... MODULE AND UNIT TOPICS 2 ................................................................................... 5 MODULE 1: Information Technologies in the Modern Organization ................. 5 MODULE 2: Data management and databases ................................................ 5 MODULE 3: Components of a telecommunications system .............................. 5 MODULE 4: Electronic Commerce and Electronic Business ............................... 5 MODULE 5: Technical View of System Analysis and Design .............................. 5 MODULE 6: Ethics, Impacts and security ............................................................ 5 MODULE 7: The internet and the World Wide Web ............................................. 6 COURSE STUDY GUIDE ........................................................................................... 6 .................................................................................................... 8 ........................................................................................................... 12 STUDY SCHEDULE EVALUATION . FORMATIVE ASSESSMENT ACTIVITIES ........................................................ 12 . SUMMATIVE ASSESSMENT ACTIVITIES ........................................................ 13 TECHNOLOGICAL TOOLS ........................................................................................... 14 CONTACT INFORMATION OF THE FACILITATOR 15 .................................................. MODULE CONTENT: MODULE 1: INFORMATION TECHNOLOGY IN THE MODERN WORLD ................ 18 ........................................... 27 MODULE 3: E- COMMERCE AND E-BUSINESS ....................................................... 38 MODULE 4: TELECOMMUNICATIONS SYSTEM ...................................................... 48 MODULE 5: INFORMATION SYSTEM DEVELOPMENT ............................................... 59 MODULE 6: ETHICS, IMPACTS AND SECURITY ........................................................ 66 MODULE 7: INTERNET AND THE WORLD WIDE WEB ............................................... 73 MODULE 2: DATA MANAGEMENT AND DATABASES Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 3 Insert related picture or quote here (adjust size and borders depending on the text below) Courtesy of Information Technology: Tool for development: lithoprobe.ca COURSE INTRODUCTION This course will provide a broad overview of how information technology (IT) impacts organizational characteristics and outcomes. It will be discussed here the principal performance enhancing benefits of IT, information efficiencies and information synergies, and identify the main organizational outcomes of the application of IT that embody these benefits. It will also be discussed here the role that IT plays in moderating the relationship between organizational characteristics and interorganizational relationships and the most strategic outcomes, organizational efficiency and innovation. Throughout the course, it will be discussed here the limitations and possible negative consequences of the use of IT. COURSE GUIDE A. Module and Unit Topics To ensure that you will demonstrate the above cited course learning outcome at the end of the semester, this course designed to be delivered in 36 contact hours was structured into seven modules. Each module contains topic learning outcomes and topic outline. Each module contains activities designed using the 5E constructivist model of learning, developed by Rodger Bybee, that encourages students to engage, explore, explain, elaborate, and evaluate their learning of topics covered therein. This means that at the end of each module, and the course as a whole, you will be assessed on your progress in attaining the course learning outcomes. Outcomes based education dictates that only when you can clearly demonstrate the course learning outcomes by the end of this course, can you be given a passing mark. The modules that form the building blocks to help you attain the course learning outcomes are as follows: MODULE 1: Information Technologies in the Modern Organization. The reasons for the widespread use of computer technology in business can best be determined by looking at how it is being used across the business world. This module will Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 4 describe the organization/business in the digital economy. It will also describe Information Technologies in the modern organization and strategic information systems. MODULE 2: Data management and databases Organizations require technology solutions to maintain, secure, manage, and process the data stored in databases. This is where Database Management System come into play. This module will discuss management of organizational data and information. It will also discuss the modern approach of databases, database management systems and logical data models. MODULE 3: Components of a telecommunications system Telecommunication is an important tool for businesses. It enables companies to communicate effectively with customers and deliver high standards of customer service. This module will discuss the telecommunications system, network services, network protocols, network processing and types of computer networks. MODULE 4: Electronic Commerce and Electronic Business E-business and E-commerce are terms that are often used interchangeably. But e-business and e-commerce are not the same. This module will elaborate on the differences between the two and some of the foundational knowledge that is critical to understanding and using e-commerce in particular. MODULE 5: Technical View of System Analysis and Design The process done by a larger organizational setting is facilitated by introducing a new sociotechnical information system or modifying or expanding an existing one. ISD includes subactivities of analysis, design, development, implementation, and evaluation. This module will discuss alternative methods and tools for systems and component- based development. MODULE 6: Ethics, Impacts and Security The way an information technology tool affects sensitive issues has a direct impact on its effectiveness and usability. It may be difficult for users and stakeholders to adopt a computer system if they feel that its use violates important values and interests. This module will discuss on impacts of IT on organizations and jobs, ethical Issues and protecting of information resources. MODULE 7: The Internet and the World Wide Web An intranet is a private network, operated by a large company or other organization, which uses internet technologies, but is insulated from the global internet. An extranet is an intranet that is accessible to some people from outside the company, or possibly shared by more Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 5 than one organization. This module will further discuss the difference among Internet, Intranets and extranets. COURSE STUDY GUIDE Finishing this course successfully relies heavily on your self-discipline and time management skills. The course modules were prepared for you to learn diligently, intelligently, and independently. Keeping yourself motivated to follow the schedules specified in the learning plan, maintaining excellence in the expected student outputs, and mastering the different technologies and procedures required in the delivery and feedback for this course, will instill in you important qualities you will need in the future as an engineer practicing your profession. The following course guides and house rules are designed for you to practice decorum consistent with standards expected within a formal academic environment. These guides shall lay the groundwork for consistency, coherence, cooperation, and clear communication among learners and instructors throughout the conduct of this course: 1. 2. MANAGE YOUR MINUTES. Create a study routine and stick to it. Keep requirement deadlines and study schedules always in mind by providing visual cues posted in your place of study or listed in your reminders (electronically, online, or on paper). Remember that there are other daily activities that take up your time, not to mention other courses you may be concurrently taking. Choose a time of day when you are most likely to maximize learning. Communicate your schedule to other members of your household so they could help you keep it. It would also help to prepare a dedicated space in your residence conducive for learning. MIND YOUR MANNERS. Treat the distance learning environment as an academic space not too different from a physical classroom. Do not do in the distance learning environment, acts you would not normally do in a face-toface classroom set up. Avoid asking questions that have already been answered in the lessons or in the instructions previously discussed or provided. This reflects your poor focus and uninspired preparation for this course. Practice Electronic Conversation Etiquette in group chats, open forums, and similar electronic venues. a. Use appropriate language and tone, correct grammar and spelling, and complete sentences acceptable in an academic forum. Avoid text-speak, slang, and all caps in your posts. b. Express your opinions politely and do not dominate the conversation. c. Avoid lengthy as well as offensive posts by sticking to the topic of the discussion. d. Take time to understand the salient points of the discussion, and provide a meaningful and well-thought response to the posts of other participants. e. For a live meeting or video/voice conferencing set-up, mute your microphone when you are not speaking to keep the focus on the main speaker. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 6 3. 4. 5. 6. 7. 8. 9. MASTER THE MEDIUM. The distance learning courses will be delivered making use of the institutional Google Suite account of Saint Louis University. It would be worthwhile on your part to devote some time and effort to learn the applications you will need to access your course materials, interact with me and your classmates, and submit course requirements. Applications of note are Google Classroom, Google Drive, and Google Meet. There are also available alternatives to Microsoft Office tools you might want to explore. Certain requirements will require you to take a video on your smart phone, save it, and submit it electronically. Work on this skill as well. If you are offline, identify the most convenient means for express mail correspondence and inform me as early as possible so we can make the necessary arrangements ahead of time. MAKE MASTERPIECES. Go beyond minimum requirements. The course learning outcomes will serve as a guide to the minimum expected competencies you are to acquire at the end of this course. It does not limit you from performing beyond it. Keep in mind that the quality of your work reflects the amount of thought and care you put into the process of completing it. It provides a very tangible measure of how much of the competencies you have developed and fully obtained throughout this course. CONNECT CONSTANTLY. There are more than sufficient online and offline modes to ensure that you are well informed and provided on time with the needed learning materials, instructions, requirements, and feedback either from me or from your classmates. Exhaust all means possible to keep in touch and updated. My contact details can be found at the latter part of this document and will be made available and widely disseminated to enrolees of this course. OBSERVE ORIGINALITY. Your course outputs will largely be submitted in electronic form. It is going to have a highly traceable and comparable digital footprint that can be easily checked for originality. Cite your sources properly for referenced statements you decide to use in your own work. Attribute statements by persons other than you by using terms like according to, he said/she said, and the like. INSTIGATE INDEPENDENCE. You are the focus of this course. Nobody else. All assessment and evaluation tools in this course are designed to measure your competence and not anybody else’s. You may use all resources at your disposal and ask other people for advice. In the end however, it is going to be your independent work that will be judged against the standards set for this course. The only way for you to maximize this course to your advantage is to learn as much from it as an individual. Make it count. RESPECT THE ROUTINE. There are traditionally respected routines we follow in the conduct of our everyday lives. Please be mindful of universally accepted norms of courtesy attached to regular schedules of personal and family time. Unless of utmost importance, please refrain from any form of communication between 8:30 PM and 7:30 AM everyday and the whole day on Sundays and official holidays. You shall expect me to adhere to this guideline myself. This will allow us all to dedicate personal time and space to other aspects of our life and maintain a healthy work-life/study-life balance. FINISH THE FIVE. To be able to help you build your own understanding from experience and new ideas, the modules in this course are designed based on the 5E Instructional Model (Engage, Explore, Explain, Elaborate, and Evaluate). Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 7 The following icons will help you find some of the most critical areas in the units of the learning modules: Additional Guidelines for Offline Students: • • • If you are a student opting for the offline mode of distance learning, you will be tasked to send back the accomplished requirements at given stages of the course through express mail correspondence on or before the scheduled date to me. Make sure you will follow it up with me through text or any other media available for you. While waiting for my feedback of your accomplished requirements, continue doing the task in the succeeding units of the module. If needed, do not hesitate to keep in touch with me through any available means. Remember, if there is a will, there is a way. STUDY SCHEDULE Below is the complete weekly schedule for the attainment of the topic learning outcomes vis-a-vis the activities. This contains also the schedule of the deadlines of the submission of the accomplished course requirements or assignments and the examination. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 8 Dates MODULE 1 TOPIC LEARNING OUTCOMES ACTIVITIES Information Technologies in the Modern Organization NOV 11-14 2020 TLO 1: Describe Information Technologies in the Modern Organization Nov 15, 2020 Module 1 Evaluative Assessment Graded Quiz Data management and databases TLO 2: Discuss data and Engage: open forum: managing database management organizational data and information Explore: Database and data management in the internet Explain: Readings on: a. The modern approach of database b. Database management systems c. Logical data models MODULE 2 Nov 16-20, 2020 Engage: Overview on basic fundaments of computers through applications of information technology Explore: Readings on Information Technology concepts and management in the internet Explain: Readings on: a. The organization in the digital economy b. Strategic Information Systems Elaborate: Importance of information technology in organizations that would enable all personnel to solve increasingly complex problems in the business. Evaluate: Module 1 evaluative assessment (graded quiz) Elaborate: Database and examples, use of database, types of database management Evaluate: Module 1 evaluative assessment (graded quiz) Nov 21, 2020 MODULE 3 Nov 22-26, 2020 Module 2 Evaluative Assessment Graded Quiz Components of a telecommunications system TLO 3: Describe the Engage: Review of the basic components of a components of a telecommunications system Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 9 telecommunication networks and key networking technologies. Explore: Readings on network services, network protocols network processing, types of computer networks Explain: Functions of telecommunication, how does a telecommunication work, scope of telecommunication network, telecommunication links Elaborate: Network topologies, communications Protocols in computer Networks, interconnections among Networks Evaluate: Module 3 evaluative assessment (graded quiz) Nov 27-28, 2020 MODULE 4 Nov 29Dec 2, 2020 Module 3 Evaluative Assessment Graded Quiz Electronic Commerce and Electronic Business TLO 4: Describe Electronic Engage: Site the key differences Commerce and Electronic between e-commerce and eBusiness business Explore: E-commerce and ebusiness support services in internet Explain: Business-to-consumer applications, B2B applications, business-to–employees, eGovernment and consumer-toconsumer EC Elaborate: E-Commerce v/s EBusiness: difference, importance, solutions and services Evaluate: Module 4 Evaluative Assessment (Graded Quiz) Dec 3-4, 2020 Module 1, Module 2, Module 3, Module 4 Evaluative Assessment Graded Midterm Examination Technical view of System Analysis and Design TLO 5: Discuss information Engage: Open forum: What is system development meant by system development? MODULE 5 Dec 5-8, 2020 Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 10 Explore: Alternative methods and tools for systems and componentbased development in the internet Explain: Agile Development, Enduser development, prototyping, Integrated computer-assisted software engineering (ICASE), component-based development, Object-oriented (OO) development, Elaborate: Typical stages of information system development process Evaluate: Module 5 Evaluative Assessment (Graded Quiz) MODULE 6 Dec 9-13, 2020 Ethics, Impacts and security TLO 6: Discuss Ethics, Impacts and security Dec 14, 2020 Module 6 Evaluative Assessment Graded Quiz The internet and world wide web TLO 7: Differentiate among Internet, Intranets and Networks MODULE 7 Dec 15-18, 2020 Engage: Readings on ethical issues, impacts and protecting information resources Explore: Lecture/Readings on Impacts of IT on organizations and jobs Explain: Discussion on information technology ethics Elaborate: Security issues in information technology Evaluate: Module 7 Evaluative Assessment (Graded Quiz) Presentation of final requirement (term paper) Engage: Open Forum: How does the internet work? Explore: Lecture/Readings on Internet, intranet and networks Explain: Follow-up Open Forum: How does the internet work? Elaborate: Differentiation of internet, intranet and networks Evaluate: Module 7 Evaluative Assessment (Graded Quiz), Presentation of final requirement (term paper) Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 11 Dec 19, 2020 Dec 20, 2020 Dec 21, 2020 Module 7 Evaluative Assessment Graded Quiz Submission of Final requirement (term paper) Module 5 module 6 module 7 Evaluative assessment Final Examination Evaluation The course modules rely on formative and summative assessments to determine the progress of your learning in each module. To obtain a passing grade in this course, you must: 1. Read all course readings and answer the pre-assessment quizzes, self-assessment activities, and reflection questions. 2. Submit all assignments and graded quizzes 3. Take the Midterm Examination 4. Submit the term paper as the final requirement 5. Take the Final Examination. • If you are a student under the offline DL mode, accomplish all print-based and electronically saved discussion activities and requirements, and submit them on time via express mail correspondence. Formative Assessment Activities Formative assessments for this course are applied to ungraded activities that are used to monitor your learning experience and provide feedback to improve both your learning approach as well as my instructional approach. • • • • • • You are required to answer the pre-assessment quizzes, self-assessment activities, and reflection questions but your scores in activities will not be included in the computation of your final grade. The reflection questions are designed to help you to critically analyze the course readings for better understanding while the pre-assessment quizzes and selfassessment activities are designed as a review management tool to prepare you for the graded quizzes and examinations. Successfully answering formative activity questions and requirements will serve as prompts to tell you if you need to study further or if you may already move forward to the next unit of the module. The completeness of your answers to the pre-assessment quizzes, self-assessment activities, and reflection questions will still be checked and will still be part of your course completion. Hence, all pre-assessment quizzes, self-assessment activities, and reflection questions must be answered. In doing your formative assessment activities, you can always ask the help of your family and friends. The pre-assessment quizzes, self-assessment activities, and reflection questions are required so you can take it anytime within the scheduled days assigned for each unit. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 12 Summative Assessment Activities The evaluative assessments are graded activities designed to determine if your acquisition of learning and performance in tests is at par with standards set at certain milestones in this course. A. Quizzes, Examinations, and Assignments Graded quizzes, examinations, and assignments are essential to determine whether your performance as a student is at par with standards/goals that need to be achieved in this course. The scores obtained from each of the graded activities will contribute to your final grade, the weights of which are presented in the grading system described in the succeeding sections of this text. Direct scoring can be used on straightforward requirements like short answers and multiple choice responses, while scoring rubrics will be provided for answers that are typically lengthy and involve a more complex level of thinking on your part. B. Final Course Requirement To achieve the course learning outcome, a final examination is required. Module 7 will provide you a summary of all the lessons covered in Modules 1 to 6. For online students, a copy of the final examination will be posted in google classroom. For offline students, a saved copy in the USB flash drive will be sent to them. They will answer it and send back the hard copy of solutions to the instructor. Technological Tools To be able to accomplish all the tasks in this course, you will need a computer or a laptop with the following software applications: Word Processing, Presentation, and Publication for requirements that do not require online access. A smart phone with video recording and editing features will also be used for activities that will require you to record videos for saving and submission. If you are a student online, access to the institutional Google Classroom will be provided through your institutional account. An invitation to join the Google Classroom will be sent to you through the SLU Student Portal and your institutional email account, so make sure to activate your institutional email account. It is equally important that you check your SLU Student Portal account at least twice a week and turn your Gmail Notifications on your mobile phone and computer. If you are a student offline, the delivery of instructions and requirements will be primarily through express mail correspondence of printed modules and saved digital content on a USB flash drive. Feedback and clarifications will be facilitated through text messaging and voice calls; hence, you need to have regular access to a cell Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 13 phone. If you need to call, or you want to talk to me, send me a message first and wait for me to respond. Do not give my CP number to anybody. I will not entertain messages or calls from numbers that are not registered in my phone. Hence, use only the CP number you submitted to me. ASSIGNMENT GUIDE I. Output You are expected to submit a complete requirement covering each module. You should also submit a term paper as your final project at the end of this course. II. Rationale Information technology has become a vital and integral part of every business. The reasons for the omnipresent use of computer technology in business can best be determined by looking at how it is being used across the business world. Devoting enough thought to analyze and assess this assignment will help you understand the impact of information technology historically on the organization and structure of the modern corporation and how it will be applied to your future job as Electrical engineers. III. Materials The assignment is available online in the Google Class materials and offline in the saved electronic files in the USB flash drive and the printed learning materials. You may consult all your reference materials and notes while doing this activity. You will also need clean sheets of short bond paper and encode your thoughts on this activity. IV. Specific Guidelines • • • • • • Click on the link to the assignment under Module 1 in our Google Classroom. Read all the instructions carefully before starting your thoughts and analysis. Encode your work in a short bond paper. No copying from your classmates. No copy- paste from the internet. For the online submission of your paper, save it as pdf document saved under the file name SURNAME, First Name. Submit the pdf file of your requirement by uploading it to the online class. V. Evaluation Tool This assignment will gauge how you write clearly, concisely and precisely based on your understanding on the materials given to you for reading. It will also measure your critical thinking skills on different situations and how to analyze and solve business or organizational problems on a broad scale using the modern technology. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 14 COURSE REFERENCES Turban & Rainer (2002). Introduction to Information Technology (3rd ed). John Wiley & Sons, Inc. Stairs & Reynolds (2013). Principles of Information Technology Systems. Cengage Learning. Gordon & Gordon (2003) Information Systems (3rd ed). http://byteintobigdata.in/basic-elements-of-a-telecommunication-system/ Contact Information of the Facilitator Engr. Sharon B. Resurreccion EE 518 Course Facilitator Cellphone SLU local extension number Institutional email address : +639204973775/ +639561952540 : Electrical Engineering : sbresurreccion@slu.edu.ph Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 15 EE 518: INFORMATION TECHNOLOGY LEARNING MODULES Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 16 MODULE 1 Information Technologies in the Modern Organization This module will cover the concept of doing business in the digital economy which will discuss the impact of digital technologies as the most important source of growth for national economies. You will learn the different business pressures that organizations are facing today, their organizational responses and how information technology supports these pressures. It will also discuss competitive advantage and strategic Information showing Systems Porter’s analysis tools: the value chain and the five forces model which examines the impact of the Internet on business strategy. You will also learn various strategic information systems and how it is being applied in every organization. By the end of this module you should be able to: TLO 1: Describe Information Technologies in the Modern Organization LEARNING OUTCOMES: By the end of this module, you should be able to: a. Describe The characteristics of the digital economy and e-business. b. Discuss the relationships among business pressures, organizational responses, and information systems. c. Describe strategic information system and how information technology helps companies improve their competitive positions. d. Describe Porter’s competitive force model e. Describe strategies that companies can use to achieve competitive advantage in their industries. Before you go on… 1. What is the difference between applications and computer- based information systems? 2. Explain how the information systems provide support for knowledge workers. 3. What are strategic information systems? 4. What are the capabilities of Information systems? 5. Why is it important to become knowledgeable about IT if you are not working as an IT employee? Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 17 Doing Business in the Digital Economy Concluding business in the digital economy using Web-based systems on the Internet and other electronic networks. Network Computing • e-business/ e-commerce the conducting of business functions (e.g., buying and selling goods and services, servicing customers, collaborating with business partners) electronically, in order to enhance an organization’s operations. • The infrastructure for e-business is network computing, which connects computers and other electronic devices via telecommunication networks. • These computers may be connected to the global networked environment, known as the internet, or to its counterpart within organizations, called an intranet, many companies link their intranet to those of their business partners over networks called extranets. Information Technology • An organization’s collection of information resources, their users, and the management that oversees them; includes the IT infrastructure and all other information systems in an organization. Figure 1: Architecture of an online travel agency Figure 1: Architecture of an online travel agency Information Technology (IT) architecture • It is a high level map or plan of the information assets in an organization. The IT integrates the entire organizations business needs for information. Information Technology (IT) infrastructure Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 18 • It consists of the physical facilities, IT components, IT services, and IT personnel that support the entire organization Major Capabilities of Information System a. Perform high-speed, high-volume, numerical computation. b. Provide fast, accurate, and inexpensive communication within and between organizations. c. Automate both semiautomatic business processes and manual tasks. d. Store huge amounts of information in an easy-to-access, yet small space. e. Allow quick and inexpensive access to vast amount of information, worldwide. f. Facilitate the interpretation of vast amounts of data g. Enable communication and collaboration anywhere, any time. h. Increase the effectiveness and efficiency of people working in groups in one place or in several locations, anywhere. i. Facilitate work in hazardous environment. Digital Economy • An economy based on digital technologies, including communication networks (the Internet, intranets, and extranets), computers, software, and other related technologies; also, sometimes called the Internet economy, the new economy, or the Web economy. Digital networking and communications infrastructures includes: • A vast array of digitizable product -data bases, news and information, books, magazines, TV and radio programming, movies, electronic games, musical CDs, and software- which are delivered over the digital infrastructure anytime, anywhere in the world • Consumers and firm conducting financial transaction digitally-through digital currencies or financial tokens carried via networked computers and mobile devices • Physical goods such as home appliances and automobiles that are embedded with microprocessors and networking capabilities. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 19 Business Model in the Digital Economy • The Internet is revolutionizing the economic, societal, and technological foundations of the old economy. Organization are developing new models for business, the economy, and government Changing a linear supply chain to a hub Figure 2 Business Model • A method of doing business by which a company can generate revenue to sustain itself; spells out how the company adds value to its products or services. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 20 Five Representative Business Models of the Digital Age 1. Name- your- Own- Price: allow the buyer to state a price he or she is willing to pay for a specific product or service. 2. Bidding Using Reverse Auctions: Via a request for quote, the buyer indicates a desire to receive bids on a particular item, and would-be sellers bid on the job 3. Affiliate Marketing: Marketing partners place a banner ad for a company on their Web site 4. Group Purchasing: The purchase orders of many buyers are aggregated, a small business, or even an individual, can get a discount 5. E-Marketplace: Markets in which buyers and sellers negotiate online Business Pressures, Organizational Responses, and IT Support • Business Pressure ➢ the business environment is the combination of social, legal, economic, physical, and political factors that affect business activities. Significant changes in any of these factors are likely to create business pressure on organization. ➢ Three Types of business pressures that organizations face are market, technology, and societal pressures. IT support for organizational responses Figure 3 The Three Types of Business Pressure Market Pressure: • The global economy and strong competition • The changing nature of the workforce Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 21 • Powerful customers. Technology Pressures: • Technological Innovation and Obsolescence • Information Overload. Societal Pressure: • Social responsibility • Government regulation and Deregulation • Spending for social programs • Protection Against Terrorist Attacks. • Ethical Issues Organizational Responses Customer Relationship Management • An enterprise wide effort to acquire and retain customers, often supported by IT Make- to- order • The strategy of producing customized products and services. Mass customization • Production process in which items are produced in a large quantity but are customized to fit the desires of each customers. Virtual corporation • A business that operates through telecommunications networks, usually without a permanent headquarters, to produce a product or service. Competitive advantage and SIS • Competitive Advantage: An advantage over competitors in some measure such as cost, quality, or speed, leads to control of a market and to larger- than average profits. Strategic Information Systems (SISs) • Systems that help an organization gain a competitive advantage through their contribution to the strategic goals of an organization and /or their ability to significantly increase performance and productivity. Competitive forces model • A business framework, devised by Michael Porter, for analysing competitiveness by reorganization five major forces that could endanger a company’s position. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 22 Porter’s five forces Model Porter’s five forces Model 1. The threat of entry of new competitors- the threat of new competitor entry is high when it is easy to enter your market and low when significant barriers to entry exist. An entry barrier is a product or service feature that customers have learned to expect from organizations in a certain industry. 2. The bargaining power of suppliers- supplier power is high when buyers have few choices from whom to buy and low when buyers have many choices. 3. The bargaining power of customers (buyers)-Buyer power is high when buyers have many choices from whom to buy and low when buyers have few choices. 4. The threat of substitute products or services-if there are many substitutes for an organization’s products or services, then the threat is high. If there are few substitutes, then the threat is low. 5. The rivalry among existing firms in the industry- the threat from rivalry is high when there is intense competition among firms in an industry. The threat is low when the competition is among fewer firms and is not intense. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 23 Answer the following questions in the Google Classroom Discussion Forum: 1. What is the importance of information technology in organizations? 2. How does Information Technology enable all personnel to solve increasingly complex problems in the business? Multiple choice: Read each question and choose the ONE best answer. 1. The pressures on organizations at the beginning of the twenty-first century include all of the following except ____________. A. need for real-time operations B. customer orientation C. social responsibility D. lack of information 2. The purpose of a strategic system is to ____________. A. provide customers more attention from organizations B. provide organizations with continuous improvement effects C. begin the process of business reengineering D. provide organizations with strategic advantages in meeting organizational objectives 3. All of the following are organizational responses to business pressures in the information age except __________. A. continuous improvement efforts B. empowerment of management for all business decisions C. electronic commerce D. business process reengineering 4. People should learn about Information Technology because __________. A. the demand for traditional information technology staff is huge B. there are small numbers of well-paid IT opportunities appearing C. both a and b D. both a and c 5. A(n) __________ collects, processes, stores, analyzes, and disseminates information for a specific purpose. A. data warehouse B. electronic commerce system C. business processing center D. information system 6. Knowledge __________. A. B. is the collecting and processing of information for a specific purpose is raw facts or descriptions of things, events, activities, and transactions Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 24 C. consists of information that has been organized and process to convey understanding, experiences, accumulated learning, and expertise as it applies to a current business problem or process D. is a collection of facts organized in some manner for understanding 7. Hardware, software, database, network, procedures, and people are basic components of a __________. A. knowledge base B. transaction processing unit C. computer-based information system D. data mart 8. All of the following statements pertaining to Computer-based Information Systems are true except _________. A. most information technologies are used alone B. CBIS uses computer technology to perform specific tasks C. basic components include hardware, software, people, networks, and database D. CBIS provide a solution to a business problem 9. Information systems must be able to do all of the following except _________. A. provide large capacity, fast access storage B. increase information overload C. provide fast communications D. span boundaries 10. Which of the following is a general technological trend for IT? A. increased use of portable computing B. personal computers increase in price and are no more powerful C. the use of multimedia takes place in large corporations D. user interfaces are becoming more complex to use E. global position devices are used only for military purposes • For students who are offline, detailed instructions are provided in your offline printed modules which will guide you in utilizing learning materials, performing learning activities, accomplishing requirements, and formatting/ saving reports and outputs for offline submission. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 25 MODULE 2 Managing Organizational Data and Information In this module, you will that learn the different characteristics of database management. It will be discussed that a Database Management System (DBMS) is a software that allows creation, definition and manipulation of database, allowing users to store, process and analyze data easily. DBMS provides an interface or a tool, to perform various operations like creating database, storing data in it, updating data, creating tables in the database and a lot more. DBMS also provides protection and security to the databases. It also maintains data consistency in case of multiple users. By the end of this module you should be able to: TLO 2: Discuss data management and databases LEARNING OUTCOMES: By the end of this module, you should be able to: a. Discuss traditional data file organization and its problems. b. Explain how a database approach overcomes the problems associated with the traditional file environment. c. Describe the three most common data models. Before you go on… 1. 2. 3. 4. What are some of the difficulties involved in managing data? What are the various source of data? Describe the data life cycle? What are the advantages and disadvantages of database management? BASICS OF DATA ARRANGEMENT AND ACCESS • The Data Hierarchy: A bit (binary digit) represents the smallest unit of data a computer can process (a 0 or a 1); a byte, represents a single character, which can be a letter, a number, or a symbol. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 26 • • • • • • • • • Field: A logical grouping of characters into a word, a small group of words, or a complete number. Record: A logical grouping of related fields. File: A logical grouping of related records. Database: A logical grouping of related files. The Data Hierarchy: A bit (binary digit) represents the smallest unit of data a computer can process (a 0 or a 1); a byte, represents a single character, which can be a letter, a number, or a symbol. Field: A logical grouping of characters into a word, a small group of words, or a complete number. Record: A logical grouping of related fields. File: A logical grouping of related records. Database: A logical grouping of related files. THE TRADITIONAL FILE ENVIRONMENT A data file is a collection of logically related records. In the traditional file management environment, each application has a specific data file related to it, containing all the data records needed by the application. PROBLEMS WITH THE DATA FILE APPROACH • • • • • • Data redundancy Data inconsistency Data isolation Data security Data integrity Application/data independence DATABASES: THE MODERN APPROACH Database. A logical group of related files that stores data and the associations among them. CREATING THE DATABASE To create a database, designers must develop a conceptual design and a physical design • • • • • • • Conceptual design: An abstract model of a database from the user or business perspective. Physical design: Layout that shows how a database is actually arranged on storage devices. Entity-relationship modeling: The process of designing a database by organizing data entities to be used and identifying the relationships among them. Entity-relationship (ER) diagram: Document that shows data entities and attributes and relationships among them. Entity classes: A grouping of entities of a given type. Instance: A particular entity within an entity class. Identifier: An attribute that identifies an entity instance. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 27 Relationships: The conceptual linking of entities in a database. The number of entities in a relationship is the degree of the relationship. Relationships between two items are common and are called binary relationships. There are three types of binary relationships: • • ➢ In a 1:1 (one-to-one) relationship, a single-entity instance of one type is related to a single-entity instance of another type. ➢ In a 1: M (one-to-many) relationship, a single-entity instance of one type is related to many-entity instance of another type. ➢ In a M:M (many-to-many) relationship, a single-entity instance of one type is related to many-entity of another type and vice versa. Entity- relationship diagram model Normalization A method for analyzing and reducing a relational database to its most streamlined form for minimum redundancy, maximum data integrity, and best processing performance. Non-normalized relation Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 28 Normalized relation DATABASE MANAGEMENT SYSTEMS Database management system (DBMS): The software program (or group of programs) that provides access to a database. What is DBMS? Database Management System (DBMS) refers to the technology solution used to optimize and manage the storage and retrieval of data from databases. DBMS offers a systematic approach to manage databases via an interface for users as well as workloads accessing the databases via apps. The management responsibilities for DBMS encompass information Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 29 within the databases, the processes applied to databases (such as access and modification), and the database’s logic structure. DBMS also facilitates additional administrative operations such as change management, disaster recovery, compliance, and performance monitoring, among others. In order to facilitate these functions, DBMS has the following key components: • Software. DBMS is primarily a software system that can be considered as a management console or an interface to interact with and manage databases. The interfacing also spreads across real-world physical systems that contribute data to the backend databases. The OS, networking software, and the hardware infrastructure is involved in creating, accessing, managing, and processing the databases. • Data. DBMS contains operational data, access to database records and metadata as a resource to perform the necessary functionality. The data may include files with such as index files, administrative information, and data dictionaries used to represent data flows, ownership, structure, and relationships to other records or objects. • Procedures. While not a part of the DBMS software, procedures can be considered as instructions on using DBMS. The documented guidelines assist users in designing, modifying, managing, and processing databases. • Database languages. These are components of the DBMS used to access, modify, store, and retrieve data items from databases; specify database schema; control user access; and perform other associated database management operations. Types of DBMS languages include Data Definition Language (DDL), Data Manipulation Language (DML), Database Access Language (DAL) and Data Control Language (DCL). • Query processor. As a fundamental component of the DBMS, the query processor acts as an intermediary between users and the DBMS data engine in order to communicate query requests. When users enter an instruction in SQL language, the command is executed from the high-level language instruction to a low-level language that the underlying machine can understand and process to perform the appropriate DBMS functionality. In addition to instruction parsing and translation, the query processor also optimizes queries to ensure fast processing and accurate results. • Runtime database manager. A centralized management component of DBMS that handles functionality associated with runtime data, which is commonly used for context-based database access. This component checks for user authorization to request the query; processes the approved queries; devises an optimal strategy for query execution; supports concurrency so that multiple users can simultaneously work on same databases; and ensures integrity of data recorded into the databases. • Database manager. Unlike the runtime database manager that handles queries and data at runtime, the database manager performs DBMS functionality associated with the data within databases. Database manager allows a set of commands to perform different DBMS operations that include creating, deleting, backup, restoring, cloning, Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 30 and other database maintenance tasks. The database manager may also be used to update the database with patches from vendors. • Database engine. This is the core software component within the DBMS solution that performs the core functions associated with data storage and retrieval. A database engine is also accessible via APIs that allow users or apps to create, read, write, and delete records in databases. • Reporting. The report generator extracts useful information from DBMS files and displays it in structured format based on defined specifications. This information may be used for further analysis, decision making, or business intelligence. Logical versus Physical View ➢ Physical view: The plan for the actual, physical arrangement and location of data in the direct access storage devices (DASDs) of a database management system. ➢ Logical view: The user’s view of the data and the software programs that process that data in a database management system. DBMS Components • • • • • • • • Data model: Definition of the way data in a DBMS are conceptually structured. Data definition language (DDL): Set of statements that describe a database structure (all record types and data set types). Schema: The logical description of the entire database and the listing of all the data items and the relationships among them. Subschema: The specific set of data from the database that is required by each application. Data manipulation language (DML): Instructions used with higher-level programming languages to query the contents of the database, store or update information, and develop database applications. Structured query language (SQL): Popular relational database language that enables users to perform complicated searches with relatively simple instructions. query by example (QBE): Database language that enables the user to fill out a grid (form) to construct a sample or description of the data wanted. data dictionary Collection: definitions of data elements, data characteristics that use the data elements, and the individuals, business functions, applications, and reports that use this data element. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 31 LOGICAL DATA MODELS • The three most common data models are hierarchical, network, and relational. Other types of data models include multidimensional, object-relational, hypermedia, embedded, and virtual • Hierarchical and network DBMSs: usually tie related data together through linked lists. Relational and multidimensional DBMSs relate data through information contained in the data. Hierarchical Database Model • Hierarchical database model rigidly structures data into an inverted “tree” in which each record contains two elements, a single root or master field, often called a key, and a variable number of subordinate fields. • The strongest advantage of the hierarchical database approach is the speed and efficiency with which it can be searched for data. • The hierarchical model does have problems: Access to data in this model is predefined by the database administrator before the programs that access the data are written. Programmers must follow the hierarchy established by the data structure. Hierarchical Database model Network Database Model • Data model that creates relationships among data in which subordinate records can be linked to more than one data element. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 32 Relational Database Model • Data model based on the simple concept of tables in order to capitalize on characteristics of rows and columns of data. • Relations: The tables of rows and columns used in a relational database. • Tuple: A row of data in the relational database model. • Attribute: A column of data in the relational database model. Three basic operations of a relational database: 1. “Select” operation: creates a subset consisting of all file records that meet stated criteria. 2. “Join” operation: combines relational tables. 3. “Project” operation: creates a subset consisting of columns in a table, permitting the user to create new tables that contain only the information required. Advantages and Disadvantages of Logical Data Models: Model Advantages Disadvantages Hierarchical database Searching is fast and efficient. Access to data is predefined by exclusively hierarchical relationships, predetermined by administrator. Limited search/query flexibility. Not all data are naturally hierarchical. Network Many more relationships can be defined. There is greater speed and efficiency than with relational database models. This is the most complicated database model to design, Implement, and maintain.Greater query flexibility than withhierarchical model, but less than with relational model. Relational database Conceptual simplicity; there are no predefined relationships among data. High flexibility in ad-hoc querying. New data and records can be added easily. Processing efficiency and speed are lower. Data redundancy is common, requiring additional maintenance. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 33 Emerging Data Models • Two emerging data models are the object-relational and hypermedia models o Object-relational database model: Data model that adds new object storage capabilities to relational databases. o Hypermedia database model: Data model that stores chunks of information in nodes that can contain data in a variety of media; users can branch to related data in any kind of relationship. Specialized Database Models a. Geographical information database: Data model that contains locational data for overlaying on maps or images. b. Knowledge database: Data model that can store decision rules that can be used for expert decision making. c. Small-footprint database: The subset of a larger database provided for field workers. d. Embedded database: A database built into devices or into applications; designed to be self-sufficient and to require little or no administration. e. Virtual database: A database that consists only of software; manages data that can physically reside anywhere on the network and in a variety of formats. Benefits of DBMS DBMS was designed to solve the fundamental problems associated with storing, managing, accessing, securing, and auditing data in traditional file systems. Traditional database applications were developed on top of the databases, which led to challenges such as data redundancy, isolation, integrity constraints, and difficulty managing data access. A layer of abstraction was required between users or apps and the databases at a physical and logical level. Introducing DBMS software to manage databases results in the following benefits: • Data security. DBMS allows organizations to enforce policies that enable compliance • • • • and security. The databases are available for appropriate users according to organizational policies. The DBMS system is also responsible to maintain optimum performance of querying operations while ensuring the validity, security and consistency of data items updated to a database. Data sharing. Fast and efficient collaboration between users. Data access and auditing. Controlled access to databases. Logging associated access activities allows organizations to audit for security and compliance. Data integration. Instead of operating island of database resources, a single interface is used to manage databases with logical and physical relationships. Abstraction and independence. Organizations can change the physical schema of database systems without necessitating changes to the logical schema that govern database relationships. As a result, organizations can upgrade storage and scale the infrastructure without impacting database operations. Similarly, changes to the logical Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 34 schema can be applied without altering the apps and services that access the databases. • Uniform management and administration. A single console interface to perform basic administrative tasks makes the job easier for database admins and IT users. For data-driven business organizations, DBMS can turn into extremely complex technology solutions that may require dedicated resources and in-house expertise. The size, cost and performance of a DBMS varies with the system architecture and use cases, and should therefore be evaluated accordingly. Also, a DBMS failure can incur significant losses to organizations that fail to maintain optimal functionality of a DBMS system. Readings: Database and examples, use of database, types of database managementpp. 111-120 of reference book Introduction to Information System by Rainer and Turban Watch this video: https://www.guru99.com/what-is-dbms.html Multiple choice: Read each question and choose the ONE best answer. 1. From the smallest unit to the largest unit of data, which is the correct data hierarchy ____________? A. byte, field, bit, file, record, database B. database, file, record, field, byte, bit C. byte, bit, field, record, database D. bit, byte, field, record, file, database 2. A logical group of related records is called a ____________. A. database B. byte C. bit D. file 3. Problems with the traditional file system include all of the following except __________. A. direct file access B. data redundancy C. data isolation D. data inconsistency 4. A database is a collection of related files and is generally __________ or __________. A. distributed or partitioned B. centralized or distributed Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 35 C. replicated or centralized D. distributed or replicated 5. To create a database, designers must develop a __________ and a __________. A. entity relationship, physical design B. conceptual design, physical design C. ER diagram, relationship design D. conceptual design, ER diagram 6. Three types of binary relationships are __________. A. 1:1 relationship B. 1:M relationship C. M:M relationship D. all of the above 7. In a DBMS there can be __________ physical view(s) and __________ logical view(s). A. many, many B. one, one C. one, many D. many, one 8. _________ databases have no predefined relationships among data and provide high flexibility in ad hoc querying. A. multi-dimensional B. network C. relational D. hierarchical 9. A _________ is a relational or multi-dimensional database management system designed to support management decision making. A. data warehouse B. data mart C. metadata model D. knowledge database 10. __________ helps organizations find hidden contents of documents including useful relationships. A. data mining B. relationship mining C. data warehouses D. text mining • For students who are offline, detailed instructions are provided in your offline printed modules which will guide you in utilizing learning materials, performing learning activities, accomplishing requirements, and formatting/ saving reports and outputs for offline submission. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 36 MODULE 3 Components of Telecommunications System This module will provide you the basic understanding of concepts and principles of telecommunication systems which includes the basic types of communication media, major types of network services, ethernet and TCP/IP protocols. It will also be discussed here the data communication concepts and techniques in a layered network architecture, types of communication, network congestion, network configuration, network model components, layered network and network topologies. By the end of this module you should be able to: TLO 3: Describe the components of a telecommunications system LEARNING OUTCOMES: By the end of this module you should be able to: a. Understand the basic telecommunications system. b. Describe the eight basic types of communications media, including their advantages and disadvantages. c. Describe the major types of network services. d. Describe the Ethernet and TCP/IP protocols. e. Differentiate between client/server computing and peer-to-peer computing Before you go on… 1. Describe the components of the basic telecommunication system. 2. What are the implications of having fiber-optic cable in everyone’s home? 3. What are the implications of Bit Torrent for the music industry? For the motion picture? Telecommunication is an important tool for businesses. It enables companies to communicate effectively with customers and deliver high standards of customer service. In its most fundamental form, a telecommunication system includes a transmitter to take information and convert it to a signal, a transmission medium to carry the signal and a receiver to take the signal and convert it back into usable information. This applies to any communication system, whether it uses computers or not. This module will further discuss Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 37 the telecommunications system, network services, network protocols, network processing and types of computer networks. The telecommunications system • • • Telecommunications system: Combination of hardware and software that transmits information (text, data, graphics, and voice) from one location to another. Analog signal: Continuous waves that transmit information by altering the amplitude and frequency of the waves. Digital signal: A discrete pulse, either on or off, that conveys information in a binary form. Basic element of telecommunication system Transmitter Transmitter (information source) that takes information and converts it to a signal for transmission. In electronics and telecommunications, a transmitter or radio transmitter is an electronic device which, with the aid of an antenna, produces radio waves. In addition to their use in broadcasting, transmitters are necessary component parts of many electronic devices that communicate by radio, such as cell phones Transmission medium Transmission medium over which the signal is transmitted. For example, the transmission medium for sounds is usually air, but solids and liquids may also act as transmission media for sound. Many transmission media are used as communications channel. One of the most common physical medias used in networking is copper wire. Copper wire to carry signals to long distances using relatively low amounts of power. Another example of a physical medium is optical fiber, which has emerged as the most commonly used transmission medium for long-distance communications. Optical fiber is a thin strand of glass that guides light along its length. The absence of a material medium in vacuum may Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 38 also constitute a transmission medium for electromagnetic waves such as light and radio waves. Receiver (radio) Receiver (information sink) that receives and converts the signal back into required information. In radio communications, a radio receiver is an electronic device that receives radio waves and converts the information carried by them to a usable form. It is used with an antenna. The information produced by the receiver may be in the form of sound (an audio signal), images (a video signal) or digital data. Wired communication Wired communications make use of underground communications cables (less often, overhead lines), electronic signal amplifiers (repeaters) inserted into connecting cables at specified points, and terminal apparatus of various types, depending on the type of wired communications used. Wireless Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. Wireless operations permit services, such as long-range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used in the telecommunications industry to refer to telecommunications systems (e.g. radio transmitters and receivers, remote controls etc.) which use some form of energy (e.g. radio waves, acoustic energy, etc.) to transfer information without the use of wires. Information is transferred in this manner over both short and long distances. Components of a Telecommunication System In its most fundamental form, a telecommunication system includes a transmitter to take information and convert it to a signal, a transmission medium to carry the signal and a receiver to take the signal and convert it back into usable information. This applies to any communication system, whether it uses computers or not. 1. Input and output devices, also referred to as 'terminals' These provide the starting and stopping points of all communication. A telephone is an example of a terminal. In computer networks, these devices are commonly referred to as 'nodes' and consist of computer and peripheral devices. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 39 2. Telecommunication channels, which transmit and receive data This includes various types of cables and wireless radio frequencies. 3. Telecommunication processors, which provide a number of control and support functions For example, in many systems, data needs to be converted from analog to digital and back. 4. Control software, which is responsible for controlling the functionality and activities of the network 5. Messages represent the actual data that is being transmitted In the case of a telephone network, the messages would consist of audio as well as data. 6. Protocols specify how each type of telecommunication systems handle the messages Other major components of a telecommunications system: Hardware Communication media Communication networks Communication software Data communication dividers Communication providers Communication protocols Communication protocols Communications processors ➢ Hardware devices that support data transmission and reception across a telecommunications system. ➢ Modem: Device that converts signals from analog to digital and vice versa. ➢ Multiplexer: Electronic device that allows a single communications channel to carry data transmission simultaneously from many sources. ➢ Front-end processor: A small secondary computer, dedicated solely to communication, that manages all routing communications with peripheral devices. Communication media and channels Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 40 ❖ Communication channel: Pathway for communicating data form one location to another. ❖ Cable media: Communications channels that use physical wires or cables to transmit data and information. ❖ Broadcast (wireless) media: Communication channels that use electromagnetic media (the ‘’airwaves’’) to transmit data. ❖ Twisted-pairs wire: copper wire twisted together in pairs used for most business telephone wiring. ❖ Coaxial cable. Insulated copper wire; used to carry high-speed data traffic and television signals. ❖ Fibber- optic cable. Thousands of very thin filaments of glass fibers, surround by cladding, that transmit information via light pulses generated by lasers. ❖ Microwave transmission. Communication channel that uses towers to send wireless signals; used for high-volume, long-distance, point-to-point communication. ❖ Satellite transmission. Communications channel that uses orbiting satellites to send digital transmission point-to-point. ❖ Propagation delay. Brief pause between the sending and receipt of a satellite transmission. ❖ Global positioning system (GPS). A wireless system that uses satellites to enable users to determine their position anywhere on the earth. ❖ Radio transmission. Communications channel that uses radio wave frequencies to send data directly between transmitters and receivers over short distances. ❖ Satellite radio (digital radio). Form of radio transmission that offers uninterrupted, near CD-quality music beamed to your radio from space. ❖ Cellular radio technology. Use of radio transmission between cells in geographic service areas and a mobile telephone switching office, enabling wireless phone service. ❖ Personal communication services (PCS) technology. Wireless communication technology that uses lower-power, higher-frequency radio waves than cellular radio technology, making PCS devices effective in places where cellular devices are not. ❖ Infrared. Red light not commonly visible to human eyes; can be modulated or pulsed for conveying information. ❖ Bandwidth. The range of frequencies available in a communications channel stated in bits per second. Network Services ▪ Computer network. A system connecting communications media, hardware, and software needed of two or more computer systems and/ or devices. ▪ Switched lined. Telephone lines through which data transmissions can be routed or switched to their destination. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 41 ▪ Dedicated lines (leased lines). telephone line that provide a constant connection between two devices and require no switching or dialling. ▪ Integrated services digital network (ISDN). A high-speed technology that allows users to transfer voice, video, image, and data simultaneously, over existing telephone lines. ▪ Digital subscriber line (DSL). A high-speed, digital data-transmission technology using existing analog telephone lines. ▪ Integrated services digital network (ISDN). A high-speed technology that allows users to transfer voice, video, image, and data simultaneously, over existing telephone lines. ▪ Digital subscriber line (DSL). A high-speed, digital data-transmission technology using existing analog telephone lines. ▪ Integrated services digital network (ISDN). A high-speed technology that allows users to transfer voice, video, image, and data simultaneously, over existing telephone lines. ▪ Digital subscriber line (DSL). A high-speed, digital data-transmission technology using existing analog telephone lines. ▪ Integrated services digital network (ISDN). A high-speed technology that allows users to transfer voice, video, image, and data simultaneously, over existing telephone lines. ▪ Digital subscriber line (DSL). A high-speed, digital data-transmission technology using existing analog telephone lines. Network protocols • Gigabit Ethernet. The most common network protocol in large corporations, which provides data transmission speeds of one billion bits per second. • Transmission control protocol / internet protocol (TCP/IP). A file transfer protocol that can send large files of information across sometimes- unreliable networks with assurance that the data will arrive uncorrupted. The International Standards Organization open systems interconnection protocol (ISO-OSI) The ISO-OSI model defines how software on different system communicates at different layers. The model has seven layers, each having its own well-defined function. Layer 1: physical layer: define the mechanism for communicating with the transmission media and interface hardware. Layer 2: data link layer: validates the integrity of the flow of data. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 42 Layer 3. network layer: defines the protocols for data routing to ensure that information arrives at the correct destination Layer 4: transport layer: defines the protocols for structuring messages. Layer 5: session layer : coordinates communications and maintains the session for as long as needed including security and log-on functions. Layer 6: presentation layer; defines the way data is formatted, converted and encoded Layer7: application layer. Defines the way that applications programs such as email interact with the network Network processing strategies • Distributed processing. Network architecture that divides processing work between two or more computers, linked together in a network. • Client/ server computing. Form of distributed processing in which some machines (servers) perform computing functions for end –user PCs (clients). • Peer- to–peer processing. A type of client/ server distributed processing that allows two or more computers to pool their resources, making each computer both a client and a server Types of computer networks • Local area network (LAN). Network that connects communications devices in a limited geographical region (e.g., a building), so that every user device on the network can communicate with every other device. • Topology. The physical layout and connectivity of a network LAN technology • File server. A repository of various software and data files for the network, which determines who gets access to what and in what sequence • Network interface card. Hardware that specifics the data transmission rate, the size of message units, the addressing information attached to each message and network topology. • Gateway. A communications processor that connects dissimilar networks by translating from one set of protocols to another • Bridge. A communications processor that connects two networks of the same type. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 43 • Router. A communications processor that routes message through several connected LANs or to a wide area network. Wireless local area networks (WLANs) • WLANs: Technologies (e.g., Bluetooth and wifi) that provide LAN connectivity over short distance, typically limited to less than 150 meters. • Bluetooth. A wireless technology that enables temporary, short-range connection between wireless devices and enables these devices to communicate with each other via low-power radio frequencies. • Wi-Fi (Wireless Fidelity). A wireless technology that can transmit information at a range up to 300 feet; another name for the 802.11b standard on which most WLANs run. • Private branch exchange (PBX). a type of LAN that controls telephone switching at a company site. Wide area networks (WAN) • A network generally is provided by a common telecommunications carrier, that covers a wide geographic area. • Value-added network (VAN). A private, data-only network that is managed by an outside third party and used by multiple organizations to obtain economies in the cost of network service and network management. • A network generally is provided by a common telecommunications carrier, that covers a wide geographic area. • Value-added network (VAN). A private, data-only network that is managed by an outside third party and used by multiple organizations to obtain economies in the cost of network service and network management. Enterprise Networking Interconnected multiple LANs and WANs. Answer the following questions in the Google Classroom Discussion Forum 1. Describe and contrast the three wireline communication channels. 2. What is the difference between LANs and WANs? 3. Describe the Ethernet and TCP/ IP protocols. 4. Describe an enterprise network. 5. Compare and contrast the ATM, SONET, and T-carrier systems. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 44 A. Multiple choice: Choose the letter representing the correct answer to each quiz question below. 1. The major components of a telecommunications system include all of the following except ____________. A. hardware B. communication media C. communication software D. applications software 2. ____________ __________ include twisted-pair wire, coaxial cable, fiber optic cable, and microwave transmission. A. communications media B. communications networks C. communication channels D. communication protocols 3. A __________ _________ consists of communications media, devices, and software needed to connect two or more computer systems and/or devices. A. computer database B. local area protocol C. wireless network D. computer network 4. Basic network topologies include all of the following except __________. A. star B. diamond C. ring D. hierarchical 5. Functions that communications software provides include all of the following except __________. A. internet access B. error checking C. communication logs D. data security and privacy 6. The most widely known communication reference model, which has 7 layers, is known as the __________. A. TCP/IP model B. ethernet model C. OSI model D. network model 7. __________ __________ __________ are often used to boost local area networks. A. asynchronous transfer mode B. switched hub technologies C. synchronous transfer mode Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 45 D. t-carrier system 8. _________ architecture links two or more computers in an arrangement in which some machines perform computing functions for end-user PCs. A. terminal/host B. distributed presentation C. distributed processing D. client/server 9. The most commonly used telecommunications application is _________. A. electronic mail B. video conferencing C. facsimile D. electronic funds transfer 10. __________ is the electronic transmission of routine repetitive business documents directly between the computer systems of separate companies doing business with each other. A. ATM B. EDI C. EFT D. E-mail • For students who are offline, detailed instructions are provided in your offline printed modules which will guide you in utilizing learning materials, performing learning activities, accomplishing requirements, and formatting/ saving reports and outputs for offline submission. MODULE 4 E-Commerce and E-Business E-commerce and E-business are the two popular networks being used nowadays particularly on online shopping that has gained fame in the last few years. Now, if you want to buy something, you do not need to walk all the way to the store. With just a smartphone and Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 46 internet connection, you can buy anything you want, from any place in this world. This module will discuss the different types of E-commerce and the different types E-business. It will also discuss the difference of the two since most people think those two terms have a similar meaning. By the end of the module the students should be able to: TLO 4: Describe Electronics Commerce and Electronics Business LEARNING OUTCOME: By the end of the module the students should be able to: a. Describe electronic commerce, its scope, benefits, limitations, and types. b. Understand the basics of how online auction and bartering work. c. Describe the major applications of business-to-consumer commerce, including service industries, and the major issues faced by e-tailers. d. Describe business-to-business applications. e. Describe e-government activities and consumer-to-consumer e-commerce f. Describe the e-commerce support services, specifically payments and logistics. g. Discuss some ethical and legal issues relating to e-commerce Before you go on… 1. Discuss various types of online services. 2. Describe online advertising, its methods and its benefits. 3. What are spamming, permission marketing, and viral marketing? Overview of E-Business and E-Commerce • • Electronic commerce (e-commerce, EC). The process of buying, selling, transferring, or exchanging products, services, and/or information via computer networks, including the Internet. E-business. A broader definition of EC, including buying and selling of goods and services, and also servicing customers collaborating e-learning, and conducting electronic transactions within an organization. Pure versus partial EC • • Electronic commerce can take several forms depending on the degree of digitization- the transformation from physical to digital- involved. The degree of digitization can relate to:(1) the product (service) sold, (2) the process, or (3) the delivery agent (or intermediary). In pure EC all dimensions are digital. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 47 • • If there is at least one digital dimension, we consider the situation partial EC. Brick- and-mortar organizations. Organization in which the product, the process, and the delivery agent are all physical. Types of E-Commerce Transactions • Business-to-Business (B2B): E-commerce in which both the sellers and the buyers are business organizations. • Collaborative commerce (c-commerce): E –commerce in which business partners collaborate electronically • Business-to-Consumers (B2C): E-commerce in which the seller are organizations and the buyers are individual also known as e-tailing. • Consumer-to-Consumer(C2C). E-commerce in which an individual sells products or services to other individuals. • Customer -to-Business (C2B). E-commerce in which customers make known a particular need for a product or service, and suppliers complete to provide the product or service to consumers. • Intrabusiness(intraorganizational) commerce. E-commerce in which an organization uses EC internally to improve its operations. • B2E (business to employees) EC: A special case of intrabusiness e-commerce in which an organization delivers product or services to its employees. • Government–to–Citizens(G2C): E-commerce in which a government provide services to its citizen via EC technologies. • Government-to–business (G2B): E-commerce in which a government does business with other governments as well as with businesses. • Mobile Commerce (m-commerce): E-commerce conducted in a wireless environment. EC Business Model • The major business model of EC are summarized in Manager’s Checklist 5.1 • Business Model. The method by which a company generates revenues to sustain itself. The Scope of EC • EC applications are supported by an infrastructure that includes hardware, software, and networks, ranging from browsers to multimedia, and also by five support areas. • • • • • People Public Policy Marketing and advertising Support services Business Partnerships Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 48 Benefits of E-commerce Benefits to organization: • The availability of natural and international markets, • The decreased cost of processing, distributing, and retrieving information. Benefit to customer: • The access to a vast number of products and services, around the clock. Benefit to society: • The ability to deliver information, services, and product to people in cities, in rural areas and in developing countries. Technological Limitations • • • The lack of universally accepted security standards. Insufficient telecommunication bandwidth. Expensive accessibility Nontechnological Limitations • A perception that EC is insecure. • Unresolved legal issue. • A lack of a critical mass of sellers and buyers. A framework for e-commerce Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 49 Major EC Mechanism • The major mechanisms for buying and selling on the Internet are electronic catalogs. Electronic auctions, and online bartering • Electronic Catalogs. Electronic catalogs on CD-ROM and the Internet have gained popularity. Electronic catalogs consist of a product database, directory and search capabilities and a presentation function. • Electronic Auctions (E-auction). A market mechanism by which sellers place offers and buyers make sequential bids, and prices are determined dynamically by competitive bidding. • Electronic battering. The exchange of goods or services without a monetary transaction. Electronic catalogs can be classified according to three dimension: • The dynamic of the information presentation. • The degree of customization. • The degree of integration with other business process or features. Types of Electronic Auctions: • Forward auction: An auction that sellers use as a selling channel to many potential buyers; the highest bidder wins the item. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 50 • Reverse auction: An auction in which one buyer, usually an organization, seeks to buy a product or a service, and suppliers submit bids; most common model for large purchase. 5.3 Business-to-Consumer Applications Electronic relating (e-tailing): The direct sale of products and services through electronic storefronts or electronic malls, usually designed around an electronic catalog format and/or auctions. • Two popular shopping location online are electronic storefronts and electronic malls: o Electronic storefront: The website of a single company, with its own Internet address, at which orders can be placed. o Electronic malls (cyber mall): A collection of individual shops under one Internet address. • Cyberbanking. Various banking activities conducted electronically from home, a business, or on the road instead of at a physical bank location. • Virtual bank. A banking institution dedicated solely to internet transactions. • Phases in Customer Service Life Cycle. • Phase 1: Requirement: Assist the customer to determine needs by providing photographs of a product, video presentation, textual descriptions, articles or reviews, sound bites on a CD, and downloadable demonstration files. • Phase 2: Acquisition: Help the customer to acquire a product or service. • Phase 3: Ownership: Support the customer on an ongoing basis • Phase 4: Retirement: Help the client to dispose of a service or product. Issues in E-tailing • Resolving channel conflict • Resolving conflicts within click–and-mortar organizations • Organizing order fulfilment and logistics. • Determining viability and risk of online e-tailers. • Identifying appropriate revenue models 5.4 Online Advertising • Improves traditional forms of advertising in a number of ways: o can be updated any time at minimal cost o can reach very large numbers of potential buyers all over the world o sometimes cheaper o can be interactive and targeted to specific interest groups and / or to individuals. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 51 It makes sense to move advertising to the Internet, where the number of viewers is growing. Shortcomings: most of which relate to the difficulty in measuring the effectiveness and cost-justification of the ads. o • Advertising Method • Banners: Electronic billboards, which typically contain a short text or graphical message to promote a product or a vendor. • Keyword banner: Banner advertising that appears when a predetermined word is queried from a search engine. • Random banner: Banner advertising that appears randomly. • Pop-up ad: An advertisement that is automatically launched by some trigger and appears underneath the active window. Some Advertising Issues and Approaches • Unsolicited Advertising: Spamming is the indiscriminate distribution of electronic ads without permission of the receiver. • Permission marketing: Method of marketing that asks consumers to give their permission to voluntarily accept online advertising and e-mail. • Viral Marketing: Virtual marketing refer to online “word-of-mouth” marketing. The main idea is to have people forward message to friends, suggesting that they ‘’check this out’’ • Interactive Advertising and Marketing: The term interactive points it the ability to an individual, to gather and remember that person’s responses, and to serve that customer based on his or her previous unique responses. Online Promotions: Attracting Visitors to a site. • Making the top of the list of search engine. • Online events, promotion and attractions. • Online coupons. 5.5 B2B Applications • In business to business (B2B) applications, the buyers, sellers, and transactions involve only organizations • The major models are: sell-side marketplaces, buy-side marketplaces, and electronic exchanges. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 52 Major B2B Models • Sell-side marketplace. B2B model in which organizations sell to other organizations from their own private e-marketplace and/or from a third-party site • Buy-side marketplace. B2B model in which organizations buy needed products or service from other organizations electronically often through a reverse auction. • E-procurement. Purchasing by using electronic support. Sell-Side Marketplaces The key mechanisms in the sell–side model are: • Electronic catalogs that can be customized for each large buyer and • Forward auctions. Buy-Side Marketplaces • Group Purchasing: The aggregation of purchasing orders from many buyers so that a volume discount can be obtained. • Desktop Purchasing: E-procurement method in which supplier’s catalogs are aggregated into an internal master catalog on the buyer’s server for use by the company’s purchasing agents. Four Types of Electronic Exchanges • Public exchanges (exchanges): E-marketplace in which there are many sellers and many buyers, and entry is open to all; Frequently owned and operated by a third party. Four basic types: • Vertical distributors for direct materials • Vertical exchanges for indirect materials. • Horizontal distributors • Functional exchanges 5.6 Intrabusiness and Business-to-Employees • Intrabusiness. E- commerce within an organization (between an organization and its employees or among business units). • Business to its Employees (B2E) commerce • E-commerce between and among units within the business • E-commerce between and among corporate Employees. 5.7 E-Government and Consumer-to-Consumer EC Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 53 • E-government. The use of e-commerce to deliver information and public services to citizens, business partners and suppliers of government entities, and those working in public sector. • E-government application can be divided into three major categories; governmentto-citizens (G2C), government–to–business (G2B), and government-to–government (G2G). Customer-to-Consumer(C2C) • E-commerce in which both the buyer and the seller are individuals (not businesses). 5.8 • C2C auctions • Classified Ads. • Personal Services. • Support services to C2C E-commerce support services Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 54 Electronic Payments • • Electronic Checks Electronic Credit Cards • Purchasing Cards • Electronic Cash • Electronic Bill Presentment and Payments • Paying Bills at ATMs. Three forms of electronic cash • Person- to-Person Payment. A form of e-cash that enables the transfer of funds between two individuals, or between an individual and a business, without the use of a credit card. • Stored-value money card. A form of e-cash on which a fixed amount of prepaid money is stored, the amount is reduced each time the card is used. • Smart card. A form of e-cards, that contains a microprocessor (chip) that enables the card to store a considerable amount of information and to conduct processing. Security in Electronic Payment • Authentication. The buyer, the seller, and the paying institution must be assured of the identity of the parties with whom they are dealing. • integrity. It is necessary to ensure that data and information transmitted in EC, are not accidentally or maliciously altered or destroyed during transmission. • Nonrepudiation. Merchants need protection against the customer’s unjustified denial of placing an order. On the other hand, customers need protection against merchant’s unjustified denial of payment made. (such denials, of both types, are called repudiation) • Privacy. Many customers want their identify to be secured. • Safety. Customers want to be sure that it is safe to provide a credit card number on the Internet. Security Protection • E-wallets (digital wallets). Mechanisms that combine security measure and convenience in EC purchasing. • Virtual credit card. A payment mechanism that allows a buyer to shop with an ID number and a password instead of with a credit card number. 5.9 Ethical issues in e-business Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 55 • Privacy • Loss of Jobs • One of the most interesting EC issues relating to loss of jobs is that of intermediation. Intermediaries provide two types of services. (1) matching and providing information and (2) value-added services such as consulting. • Disintermediation: Elimination of intermediaries in EC. • Reintermediation: Occurs where intermediaries such as brokers, who provide valueadded services and expertise, cannot be entirely eliminated from EC. Legal Issues Specific to E-Commerce • Fraud on the internet • Domain names • Taxes and other fees. • Copyright Tips for Safe Electronic Shopping ❑ Look for reliable brand names at sites like Wal-Mart online, and Amazon.com. Before purchasing, make sure that the site is authentic by entering the site directly and not from an unverified link ❑ Search any unfamiliar selling site for the company’s address and phone and fax numbers. Call up and quiz the employee about the seller. ❑Check out the vendor with the local chamber of commerce or better business bureau (bbbonline.org). Look for seals of authenticity such as TRUSTe. ❑ Investigate how secure the seller’s site is by examining the security procedure and by reading the posted privacy notice ❑Examine the money- back guarantees, warranties, and service agreements. ❑ Compare price to those in regular stores. too.-low prices are too good to be true, and some ‘’catch ‘’ is probably involved. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 56 ❑ Ask friends what they know. Find testimonials and endorsements in community sites and well –known bulletin boarder. ❑find out what your rights are in case of a dispute. Consult consumer protections agencies and the national fraud information center (fraud.org) ❑check consumerworld.org for a listing of useful resources. Answer the following questions in the Google Classroom Discussion Forum. 1. Discuss the major limitations of E-commerce. Which of these limitations are likely to disappear? 2. Discuss the benefits to sellers and buyers of a B2B exchange. 3. Why is order fulfillment in B2C considered difficult? Web Activities: 1. Access www. Realtor.com. Prepare a list of services available on this site. Then prepare a list of advantages derived by the users and advantages to realtors. Are there any disadvantages? To whom? 2. Enter www. campusfood.com. Explore this site. Why is the site so successful? Could you start a competing one? Why or why not? 3. Enter www. alibaba.com. Identify the site’s capabilities. Look at the site’s private trading room. Write a report. How can such a site help a person who is making a purchase? • For students who are offline, detailed instructions are provided in your offline printed modules which will guide you in utilizing learning materials, performing learning activities, accomplishing requirements, and formatting/ saving reports and outputs for offline submission. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 57 MODULE 5 Technical View of System Analysis and Design This module aims to study the organization’s strategic plan. You will also discuss about IT architecture that enables users, applications, and databases to be seamlessly networked and integrated. You will learn how to allocate IS development resources efficiently among competing projects, so the projects can be completed on time, within budget, and have required functionality. It will also give you an overview of the traditional Software Development Life Cycle. Alternative methods and tools for systems development and component- based development and web services will also be covered. By the end of this module, you should be able to: TLO5: Describe Information System Development, alternative methods and tools for systems and component- based development LEARNING OUTCOMES: By the end of this module, you should be able to: a. Describe the hierarchy and steps of IT architecture. b. Describe the SDLC and its advantages and limitations. c. Describe the major alternative methods and tools for building information systems. d. Describe the use of component - based development and web services. Before you go on… 1. Describe an IT architecture. 2. Discuss how to develop IT architecture. 3. Describe an IT infrastructure and its applications. DEVELOPING AN IT ARCHITECTURE Koontz (2000) suggested a six-step process for developing an IT architecture Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 58 • • • • • • Step 1: Business goals and vision. The system analyst reviews the relevant business goals and vision. Step 2: Information architecture. A company analyst defines the information necessary to fulfil the objectives of step 1. Step 3: Data architecture. What data you have and what you want to get form customers, including Web-generated data. Step 4: Application architecture. Define the components or modules of the applications that will interface with the required data. Build the conceptual framework of an application, but not the infrastructure that will support it. Step 5: Technical architecture. Formally examine the specific hardware and software required to support the analysis in previous step. Step 6: Organizational architecture. An organizational architecture deals with the human resources and procedure required by steps 1 through 5 OVERVIEW OF SDLC • Systems development life cycle (SDLC) is a structured framework used for large IT projects, that consists of sequential processes by which information systems are developed. An eight- stage system development life cycle (SDLC) o o o o Waterfall approach. SDLC approach in which tasks in one stage were completed before the work proceeded to next stage Systems analysts. IS professionals who specialize in analyzing and designing information systems. Programmers. IS professionals who modify existing computer programs or write new computer programs to satisfy user requirements. Technical specialist. Experts on a certain type of technology, such as databases or telecommunications Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 59 SYSTEM STAKEHOLDERS • All people who are affected by changes in information systems SYSTEMS INVESTIGATION • • Systems investigation begins with the business problem (or business opportunity). The next task in the systems investigation stage is the feasibility study that gauges the probability of success of a proposed project and provides rough assessment of the project's feasibility. FEASIBILTY SUDY • • Technical feasibility: Assessment of whether hardware, software and communications components can be developed and /or acquired to solve a business problem. Economic feasibility: Assessment of whether a project is an acceptable financial risk and if the organization can afford the expense and time needed to complete it. ECONOMIC FEASIBILITY ➢ Return on investment. The ratio of the net income attributable to a project divided by the average assets invested in the project. ➢ Net present value. The net amount by which project benefits exceed project costs of capital and the time value of money. ➢ Breakeven analysis. Method that determines the point at which the cumulative cash flow from a project equals the investment made in the project. • • Organizational feasibility: organization’s ability to access the proposed project. Behavioural feasibility: Assessment of the human issues involved in a proposed project, including resistance to change and skills and training needs. SYSTEMS ANALYSIS • The examination of the business problem that the organization plans to solve with an information system. This stage defines the business problem, identifies its causes, specifies the solution and identifies the information requirements that the solution must satisfy ➢ Organization have three basic solutions to any business problem relating to an information system : o Do nothing and continue to use the existing system unchanged, Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 60 o o Modify or enhance the existing system, Develop a new system There are problems associated with eliciting information requirement, regardless of the method used by the analyst. ➢ The business problem may be poorly defined ➢ The users may not know exactly what the problem is, what they want or what they need. ➢ Users may disagree with each other about business procedures or even about the business problem. ➢ The problem may not be information related, but may require other solutions, such as a change in management or additional training. • The system analysis stage produces the following information: ➢ Strengths and weaknesses of the existing system ➢ Functions that the new system must have to solve the business problem. ➢ User information requirements for the new system. SYSTEMS DESIGN • • System analysis describes what a system must do to solve the business problem and systems design describes how the system will accomplish this task . The deliverable of the systems design phase is the technical design that specifies the following : System outputs, inputs and user interfaces • Hardware, software, databases, telecommunications, personnel and procedures • How these components are integrated. This output represents the set of system specification System design encompasses two major aspects of the new system : ➢ Logical system design: states what the system will do, using abstract specifications. ➢ Physical system design: states how the system will perform its functions, with actual physical specification. PROGRAMMING • The translation of a system’s design specification into computer code. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 61 TESTING • • Testing check to see if the computer code will produce the expected and desired results under certain conditions Testing is designed to delete errors (bugs) in the computer code. These errors are of two types. Syntax errors ( e.g., misspelled word or a misplaced comma) and logic errors that permit the program to run but result in incorrect output IMPLEMENTATION • Implementation or deployment is the process of converting from the old system to the new system. Organizations use four major conversion strategies; parallel , direct , pilot and phased. ➢ Parallel conversion. Implementation process in which the old system and the new system operate simultaneously for a period of time. ➢ Direct conversion. Implementation process in which the old system is cut off and the new system turned on at a certain point in time. ➢ Pilot conversion. Implementation process that introduces the new system in one part of the organization on a trial basis, when new system is working property, it is introduced in other parts of the organization. ➢ Phased conversion. Implementation process that introduces components of the new system in stages, until the entire new system is operational. OPERATION AND MAINTENANCE • Systems need several types of maintenance. ➢ Debugging: a process that continues throughout the life of the system. ➢ Updating: updating the system to accommodate changes in business conditions. ➢ Maintenance: that adds new functionally to the system –adding new features to the existing system without disturbing its operation. ALTERNATIVE METHODS AND TOOLS FOR SYSTEMS DEVELOPMENT • • • • • Prototyping Joint application design (JAD) Rapid application development (RAD) Object- oriented development Other methods Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 62 • • • • • • Prototyping. Approach that defines an initial list of user requirements, builds a prototype system and then improves the system in several iterations based on users’ feedback. Joint application design (JAD). A group –based tool for collecting user requirements and creating system designs. Rapid application development. A development method that uses special tools and an iterative approach to rapidly produce a high-quality system. Computer-aided software engineering (CASE). Development approach that uses specialized tools to automate many of the tasks in the SDLC; upper CASE tools in SDLC automate the early stages of the SDLC, and lower case tools automate the later stages. Integrated Computer Assisted software Engineering (ICASE) Tools . CASE tools that provide links between upper CASE and lower CASE tools. Object- oriented development. Begins with aspects of the real world that must be modelled to perform a task. COMPONENT-BASED DEVELOPMENT (CBD) AND WEB SERVICE • CBD: A method that uses pre-programmed components to develop application. • Web service in system development: Self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device. Web Services Advantages and Limitations Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 63 Watch video on system analysis design. https://www.youtube.com/watch?v=pOzSlT2Chi0 The figure below shows a model for prototyping process. 1. Explain the flow until a particular project is completely done. 2. Discuss the advantage and disadvantages of prototyping. 3. When do you usually use prototyping method to analyze a project? Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 64 MODULE 6 Information Systems: Ethics, Privacy and Security The way an information technology tool affects sensitive issues has a direct impact on its effectiveness and usability. It may be difficult for users and stakeholders to adopt a computer system if they feel that its use violates important values and interests. This module will discuss the impacts of IT on organizations and jobs, ethical Issues and protecting of information resources, Impacts on individuals at work, societal impacts and Internet communities, IS vulnerability and computer crimes. By the end of this module you should be able to: TLO6 : Discuss Ethics, Impacts and security LEARNING OUTCOMES: By the end of this module you should be able to: a. Describe the major ethical issues related to information technology and identify situations in which they occur. b. Identify the many threats to information security. c. Understand the various defense mechanisms used to protect information systems. d. Explain IT auditing and planning for disaster recovery. Before you go on… 1. Describe the issue of privacy as it is affected by Information Technology. 2. What does a code of ethics contain? 3. Give an example of one type of unintentional threat to a computer system. 4. Describe the issue of intellectual property protection. A. Ethical Issues • Ethics. A branch of philosophy that deals with what is considered to be right and wrong. • Code of ethics. A collection of principles intended as a guide for the members of company or an organization. • Ethical issues can be categorized into four types: 1. Privacy Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 65 2. Accuracy 3. Property 4. Accessibility Protecting Privacy • Privacy. The right to be left alone and to be free of unreasonable personal intrusions Two rules have been followed fairly closely in past court decision in many countries: 1. The right of privacy is not absolutes. Privacy must be balanced against the needs of society 2. The public’s right to know is superior to the individual’s right of privacy. • Electronic surveillance. The tracking of people‘s activities, online or offline, with the aid of computers. • Privacy policies/codes. An organization’s guidelines with respect to protecting the privacy of customers, clients, and employees. Protecting Intellectual Property • Intellectual property. The intangible property created by individuals or corporations, which is protected under trade secret, patent, and copyright, laws. • Trade secret. Intellectual work such as a business plan, that is a company secret and is not based on public information. • Patent. A document that grants the holder exclusive rights on an invention or process for 20 years. • Copyright. A grant that provides the creator of intellectual property with ownership of it for the life of the creator plus 70 years. B. Impacts of IT on organizations and Jobs • The use of information technologies, most recently the web, has brought many organizational changes in areas such as structure, authority, power, job content, employee career ladders, supervision and manager’s job. How will organizations change? • Fatter organization hierarchies. • Changes in supervision. • Power and status. How will job change? • Job content • Employee career ladders • The manager’s job C. Impacts on Individuals at Work • Will my job be eliminated? • Dehumanization and psychological impacts Dehumanization: Loss of identity Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 66 • Information anxiety: Disquiet caused by an overload of information Impacts on health and safety Ergonomics: The science of adapting machines and work environment to people. Societal Impact and Internet Communities • Opportunities for people with disabilities • Quality-of-life improvements • Technology and privacy • The digital divide • Free speech versus censorship • Controlling spam • Virtual communities Technology and privacy • Scanning crowds for criminals • Cookies and individual privacy • Digital millennium Copyright Act and Privacy The Digital Divide • The gap in computer technology in general, and now in web technology, between those who have such technology and those who do not. • Cybercafés: Public places in which Internet terminals are available usually for a small fee. Free speech versus censorship • Controlling spam. • Spamming. The practice of indiscriminately broadcasting message over the Internet. Virtual communities • Groups of people with similar interests who interact and communicate via the Internet A. IS Vulnerability and Computer Crimes • Identity theft. Crime in which someone uses the personal information of others to create a false identity and then uses it for some fraud. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 67 Security Terms Type of computer crimes and criminals • Hacker. An outside person who has penetrated a computer system, usually with no criminal intent. • Cracker. A malicious hacker. • Social engineering. Getting around security systems by tricking computer users into revealing sensitive information or gaining unauthorized access privileges. • Cybercrimes. Illegal activities executed on the Internet. • Identify theft. A criminal (the identity thief) poses as someone else. • Cyberwar. War in which a country’s information systems could be paralyzed from a massive attack by destructive software. • Virus. Software that can attach itself to (‘’infect’’) other computer programs without the owner of the program being aware of the infection. Security Terms Method Definition Virus Secret instructions inserted into programs (or data) that are innocently ordinary tasks. The secret instructions may destroy or alter data as well as spread within or between computer systems Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 68 Worm A program that replicates itself and penetrates a valid computer system. It may spread within a network, penetrating all connected computers. Trojan horse An illegal program, contained within another program, that ‘’sleep' until some specific event occurs then triggers the illegal program to be activated and cause damage. Salami slicing A program designed to siphon off small amounts of money from a number of larger transactions, so the quantity taken is not readily apparent. Super zapping A method of using a utility ‘’zap’’ program that can bypass controls to modify programs or data Trap door A technique that allows for breaking into a program code, making it possible to insert additional instructions. Logic bomb An instruction that triggers a delayed malicious act Denial of services Too many requests for service, which crashes the site Sniffer A program that searches for passwords or content in packet of data as they pass through the Internet Spoofing Faking an e-mail address or web-page to trick users to provide information instructions Password cracker A password that tries to guess passwords (can be very successful) War dialling Programs that automatically dial thousands of telephone numbers in an attempt to identify one authorized to make a connection with a modem, then one can use that connection to break into databases and systems Back doors Invaders to a system create several entry points, even if you discover and close one, they can still get in through others Malicious applets Small Java programs that misuse your computer resource, modify your file, send fake e-mail, etc B. • • • • Protecting Information Resources Controls Securing your PC Concluding thoughts about computer Auditing information systems Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 69 • • • • • Disaster recovery planning Disaster recovery. The chain of events linking planning to protection to recovery. Disaster avoidance. A security approach oriented toward prevention. Backup location. Location where, in the event of a major disaster, an extra copy of data and/ or key programs are kept. Hot site. Location at which vendors provide access to a fully configured backup data center. Web Activities: 1. Software piracy is a global problem. Access the following websites: www. bsa.org and www.microsoft.com/piracy/. What can organizations do to mitigate this problem? Are some organizations dealing with the problem better than others? 2. Visit www.junkbusters.com and learn how to prohibit unsolicited e-mail (spam). Describe how your privacy is protected. Problem Solving Activity An information security manager routinely monitored the Web surfing among her company’s employees. She discovered that many employees were visiting the “sinful six” Web sites. (Note: The sinful six are Websites with material related to pornography, gambling, hate, illegal activities, tastelessness, and violence.) She then prepared a list of the employees and their surfing histories and gave the list to management. Some managers punished their employees. Some employee, in turn, objected to the monitoring, claiming that they should have a right to privacy. a. Is monitoring of Web surfing by managers ethical? (It is legal) Support your answer. b. Is employee Web surfing on the “sinful six” ethical? Support your answer. c. Is the security manager’s submission of the list of abusers to management ethical? Why or why not? d. Is punishing the abusers ethical? Why or why not? If yes, then what types of punishment are acceptable? e. What should the company do in order to rectify the situation? • For students who are offline, detailed instructions are provided in your offline printed modules which will guide you in utilizing learning materials, performing learning activities, accomplishing requirements, and formatting/ saving reports and outputs for offline submission. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 70 MODULE 7 Internet and the World Wide Web An intranet is a private network, operated by a large company or other organization, which uses internet technologies, but is insulated from the global internet. An extranet is an intranet that is accessible to some people from outside the company, or possibly shared by more than one organization. This module will further discuss the evolution, operations, and services of the internet, the segment of the Internet called the World Wide Web, organizational applications of Internet technology (intranets and extranets) and specialized Internet applications. By the end of this module you should be able to : TLO7: Differentiate among Internet, Intranets and Networks LEARNING OUTCOMES: By the end of this module you should be able to: 1. Differentiate among the internet, the world wide web, intranets, and extranets. 2. Describe how the internet operates. 3. Discuss the various ways to connect to the internet. 4. Describe the parts of an internet address. Before you go on… 1. 2. 3. 4. 5. Describe the various ways that you can connect to the internet. Describe the parts of an internet address. What are the roles of browsers? What is the difference between the internet and world wide web? What is URL? What is the Internet? ❖ The largest computer network in the world (a network of networks) ❖ Information exchange is seamless using open, non-proprietary standards and protocols, within interconnected networks ❖ A true democratic communications forum producing a democratization of information Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 71 ❖ Spirit of information sharing and open access underlies the Internet. The Internet Today ❖ The Internet is international, with users on all continents ❖ The cost of personal computers and Internet connections are prohibitively high for most of the world’s population ❖ Political, cultural, and regulatory barriers have slowed the rate of Internet adoption internationally ❖ The vast majority of sites are in English ❖ The vast majority of content is generated in the United States The Infrastructure of the Internet ❖ Commercial communications companies are primary providers of the physical network backbone of the Internet ❖ The U.S. government contributes some funds to essential administrative processes ❖ The Internet infrastructure is supplied by network service providers ❖ Connections between and flow of information between backbone providers has been open and free of charge Future Internet Initiatives ❖ Internet2 ➢A collaboration among more than 180 U.S. universities to develop leadingedge networking and advanced applications for learning and research. ➢ A group of very high bandwidth networks on the Internet. ➢ Partnership between universities, industry, and government. ❖ Next Generation Internet (NGI) ➢ Federal government led initiative to advance Internet technology and applications. The Operation of the Internet ❖ Packets of information flow between machines governed by common rules (protocols): ➢ Internet protocol (IP) ➢ Transport control protocol (TCP) ❖ Internet is a packet-switching network ➢ Messages are decomposed into packets, containing part of the message, plus information on the sending and receiving machines and how the packet relates to the other packets ➢ Packets travel independently and possibly on different routes through the Internet ➢ Packets are reassembled into the message at the receiving machine. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 72 Each computer on the Internet is identified by an IP address Most computers also have domain names Network Solutions, Inc. had a monopoly on domain name registration until 1999. Today, some 82 companies can register domain names. Cybersquatting – purchase of domain name with intent to resell it. Legislative action resulted in Nov. 2000 ❖ New top-level domain zones: In November 2000, the first addition of a global toplevel domains to the Internet since the 1980s occurred. ➢ .aero (for the air-transport industry) ➢ .biz (for businesses) ➢ .coop (for cooperatives) ➢ .museum (for museums) ➢ .name (for individuals) ➢ .pro (for professions) ❖ Accessing the Internet ➢ Connect via LAN Server ➢ Connect via Serial Line Internet Protocol/Point Protocol (SLIP/PPP) ➢ Connect via an Online Service (AOL, MSN) ❖ ❖ ❖ ❖ ❖ Internet Services – Communications ❖ E-mail – electronic messaging ❖ USENET newsgroups – forums that collect groups of messages from users based on common themes ❖ LISTSERV – distributes email messages to all subscribers ❖ Chatting – live, interactive, written conversations based on topic groups ❖ Instant messaging – instant text messaging between Internet users ❖ Telnet – user on one computer doing work on another computer ❖ Internet telephony – conducting voice conversations over the Internet ❖ Internet fax – real time document transmittal ❖ Streaming audio and video Internet Services – Information Retrieval ❖ File Transfer Protocol (FTP) – electronic transfer of files from one computer to another ❖ Archie – tools to enable searching for files at FTP sites ❖ Gophers – menu-driven information search tool ❖ Veronica – text search through Gopher sites ❖ Wide Area Information Servers (WAIS) – database search tool Internet Services – Web Services ❖ Delivery of software components via a web site rather than through traditional means (disks, CDs) ❖ .NET – Microsoft’s new platform for XML Web services. Integrates web sites and programs to deliver applications. Internet Services – World Wide Web Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 73 ❖ An application that uses the Internet transport functions ❖ A system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture ❖ Based on HTML - standard hypertext language used in Web ❖ Handles text, hypermedia, graphics, and sound The World Wide Web ❖ Home Page - a text and graphical screen display; first, introductory page in a web site ❖ Web Site - all the pages of a company or individual ❖ Hyperlinks - ways to link and navigate around the pages on a web site ❖ Webmaster - the person in charge of a Web site ❖ Uniform Resource Locator (URL) - points to the address of a specific resource on the Web ❖ Hypertext Transport Protocol (HTTP) - communications standard used to transfer pages across the WWW portion of the Internet ❖ Browsers – graphical software that enables WWW users to request and view web documents ❖ Offline Browsers – software that retrieves pages from Web sites automatically at predetermined times ❖ Search Engines - programs that return a list of Web sites or pages that match some user-selected criteria ❖ Metasearch Engines - automatically enter search queries into a number of other search engines and return the results ❖ To be included in a search engine’s database ➢ Web Crawlers ➢ Registration ❖ Pull Technology - requires web user to actively request information; traditional web mechanism ❖ Push Technology - automatically supplies desirable information to users ➢ provides timely, prioritized distribution of information over a corporate network in the workplace ➢ enhances traditional Web advertising in the consumer market ➢ used for software delivery and updates ❖ Information Filters – automated methods of sorting/screening WWW content ❖ Clipping Services – automated retrieval of articles and news items from publications ❖ Personalized Web Services – ability to generate personalized Web content ❖ Web Authoring (for page and site design) ➢ Standard HTML is the common denominator ➢ CompuServe Graphics Interchange Format (GIF) and Joint Photographic Experts Group (JPEG) is the common format of graphics files ➢ Browsers can be extended through software plug-ins Internet Challenges Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 74 ❖ New Technologies ➢ Adopted by vendors more rapidly than users and customers can implement them ➢ Web developers cannot assume that users can run their innovations successfully ❖ Internet Regulation ➢ Technical organizations (e.g., World Wide Web Consortium) develop standards governing the Internet’s functionality ➢ These organizations are not formally charged in any legal or operational sense with responsibility for the Internet ➢ How to control controversial content on the Web? ❖ Internet Expansion ➢ Tremendous Internet traffic growth has strained some elements of the network • Slower retrieval times • Unreliable data transmission • Denial of service by overloaded servers ➢ Approaches to overcoming this congestion include • Improved hardware technology • Improved Web management software ❖ Internet Privacy - Web sites collect information with and without consumers’ knowledge ➢ Cookie - small data file placed on users’ hard drives when a site is first visited. Collects data on pages visited and content viewed. ➢ Three potential approaches to the privacy issue • Government lets groups develop voluntary privacy standards; does not take any action now unless real problems arise • Government recommends privacy standards for the Internet; does not pass laws at this time • Government passes laws now for how personal information can be collected and used on the Internet ➢ Financial transaction security also a concern Intranets ❖ A private network that uses Internet software and TCP/IP protocols ➢ Provide employees with easy access to corporate information ➢ Used to deploy corporate applications • Examples – policies and procedures manuals; human resource forms; product catalogs ➢ Security is a concern • Security measures include – public key security, encryption, digital certificates, firewalls Extranets Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 75 ❖ An extension of an intranet to selected outside business partners, such as suppliers, distributors, and key customers ➢ Provide business partners with easy access to corporate information and easy collaboration ❖ Security ➢ Critical to prevent unwanted entry into internal systems ➢ Virtual private networks (VPNs) are often used to add security to Internet communication ❖ Extranet configurations ➢ One company sets up an Extranet for its dealers, customers, or suppliers ➢ Companies within an industry set up a collaborative Extranet for mutual benefit ➢ Several companies collaborate over an Extranet for joint venture ❖ Benefits include – ➢ Lower communication costs; better communication; improved order entry and customer service; improvement in business effectiveness Other Web-based Applications ❖ Enterprise Information Portals ➢ Users have single point of access to internal and external stored information ❖ Mobile Internet ➢ Use of wireless communication telecommunication devices to access Webbased applications Summary ❖ Internet is a network of network ❖ Internet provides communication and information retrieval services, as well as the World Wide Web ❖ The World Wide Web enables a huge variety of applications for businesses, including intranets and extranets ❖ Many challenges exist when using the WWW, including congestion, privacy, and security Discussion Questions: 1. What is the world wide web and how does it differ from the internet? Why do so many people equate the two terms? 2. Should the internet be regulated? If so, by whom? 3. Discuss the pros and cons of the internet. 4. Explain how the internet works. Assume you are talking to someone who has no knowledge of information technology (in other words keep it very simple). Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 76 Web Exercises: 1. You want to set up your own Web site using your name for the domain name (for example, JuanCruz) a. Explain the process for registering a domain. b. Which top-level domain will you use and why? c. Access www.icann.org and obtain the name of an agency or company that can register a domain for the TLD that you selected. What is the name of the agency or company? 2. Access the Web site for the agency or company to learn the process that you must use. How much will it initially cost to register your domain name? How much will it cost to maintain that name in the future? • For students who are offline, detailed instructions are provided in your offline printed modules which will guide you in utilizing learning materials, performing learning activities, accomplishing requirements, and formatting/ saving reports and outputs for offline submission. Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited. 77