session 2-it enabled technologies
Post on 06-Jul-2018
218 Views
Preview:
TRANSCRIPT
-
8/17/2019 Session 2-IT Enabled Technologies
1/15
-
8/17/2019 Session 2-IT Enabled Technologies
2/15
Development of theinternet• The development of the internet stems from innovations
in computer technology.
• The rst attempts at constructing a computer date bac!to the early t"entieth century.
• In #$#% &annevar Bush invented the 'rolic Tracer( adevice comprising a bicycle "heel( a rotating drum( gearsand a pen.
• The device could measure distances over uneven ground.
• By #$#$( Bush had created the rst computer that couldsolve mathematical e)uations( called the *di+erential
analyser,.
• The onset of t"o -orld -ars meant that greaterinvestment "as poured into developing technology formilitary purposes. omputers became bigger and moresophisticated.
-
8/17/2019 Session 2-IT Enabled Technologies
3/15
-
8/17/2019 Session 2-IT Enabled Technologies
4/15
• The application of business activities via theinternet has been a feature of the businessenvironment since the late #$'A7 in #$9'A had successfully introduced a
system called A>'AET that facilitated the sharingof information electronically bet"een itshead)uarters and selected universities across the/SA.
-
8/17/2019 Session 2-IT Enabled Technologies
5/15
• By the mid #$@=s the ational Science 5oundation 6S57 of the /SA"as commissioned to further the activities of A>'AET across theuniversity sector.
• The development of electronic mail 6e1mail7 "as one feature of theburgeoning interest in electronic communications.
•
In #$
-
8/17/2019 Session 2-IT Enabled Technologies
6/15
• By the early #$$=s the use of the internet had e;panded beyonduniversity departments and government bodies to incorporatethe business "orld.
• o"ever( the use of the internet for business purposes got o+ toa slo" start because no infrastructure e;isted that could connect
users to the net"or! from any location around the globe.• Cnly those "ith a good !no"ledge of the technology could nd
their "ay around the large number of databases.
• Even then the "hole process "as time1consuming andfrustrating.
• 5or the internet to be adopted by the business community( and
the general public( there "as a need for a system that madenavigation of the net"or! simple and narro"ed do"n thenumber of documents that users had to search through beforeaccessing the information they needed.
• Early search facilities included 4opher( a system that usedmenus as a means of searching for documents.
-
8/17/2019 Session 2-IT Enabled Technologies
7/15
---
• 'erhaps the most signicant development inbringing for"ard the application of business via theinternet "as the emergence of the -orld -ide -eb6---7. The usability of the internet "as greatly
enhanced after researcher Tim Berners eedeveloped the hyperte;t transfer protocol 6TT'7at the E> atomic research centre in S"it3erlandin #$$%.
• Through TT' it is possible to use a hyperte;t
mar!up language 6TM7 to design "eb pages "ithte;t( graphics and a range of other formattingtechni)ues to create a visually appealing layout( as"ell as lin!ing documents electronically to otherdocuments.
-
8/17/2019 Session 2-IT Enabled Technologies
8/15
Information Infrastructure
• The information infrastructure is the supportsystem that allo"s the internet to "or!.
• The main infrastructure support facilities e;ist indeveloped nations "here access to the internet
has moved beyond ;ed location computers toincorporate mobile "ireless computers and mobilephones.
-
8/17/2019 Session 2-IT Enabled Technologies
9/15
Broadband
• Broadband is a term used to describe theband"idth of a transmitted communicationssignal
• The band"idth describes a range of fre)uencies
that the signal occupies• The band"idth for digital and analogue
corresponds to the amount of informationreceived or sent over a particular time unit
•
igher band"idth increases transmission speedsand facilitates the communication of muchgreater volumes of information
-
8/17/2019 Session 2-IT Enabled Technologies
10/15
Electronic DataInterchange• Electronic Data Interchange 6EDI7 describes the
e;change of documents bet"een organisations instandardised electronic form directly bet"eencomputer applications.
•Many routine and procedural processes bet"eenorganisations are automated and completedelectronically using EDI.
• 'urchase orders( invoices and material releases are ?ust some e;amples of these processes "here EDI
can result in cost savings and increased eciency• Another advantage of EDI is the standard format of
communication bet"een organisations that ito+ers
-
8/17/2019 Session 2-IT Enabled Technologies
11/15
• Minoli and Minoli 6#$$
-
8/17/2019 Session 2-IT Enabled Technologies
12/15
-ireless Technology
• -ireless technology has been the catalyst forstructural change in the internet economy since itrst emerged as a viable e1business channel inthe #$$=s.
• The lac! of mobility is a shortcoming of traditionale1business models 6>opers( 2==#7. -irelesstechnology is driving the emergence of ne"business models that e;ploit opportunities beyondthe e1business paradigm
-
8/17/2019 Session 2-IT Enabled Technologies
13/15
• The emergence of mobile internet net"or!s canbe vie"ed as one of the most signicant mediaopportunities presented to rms across a "iderange of industry sectors.
• Business opportunities derived from the mobileinternet( usually termed *m1commerce,( dependon value1adding services that facilitate thecommunication of information or transactions viapublic or private mobile telecommunications
net"or!s
-
8/17/2019 Session 2-IT Enabled Technologies
14/15
'ayment Systems
• There are many payment service providers such as-orld'lay and 0a?i( but it is 'ay'al that leads the mar!et.
• Most businesses accept payments via their "ebsite andcompanies such as 'ay'al facilitate safe methods oftransacting.
• Cnline traders can open a payment service by accessingthe "ebsite of the payment service provider and simplyclic! through for details relating to online trading.
• 5rom there( online traders need only complete anapplication form to become a client of the payment
service provider. Most providers o+er some level ofprotection for their client,s customers should there be aproblem "ith a transaction such as fraud or non1deliveryof goods
-
8/17/2019 Session 2-IT Enabled Technologies
15/15
• Cne of the most important aspects of secure payment systemsfor e1business and e1commerce is the authenticity oftransactions.
• The most common soft"are used for this purpose is SecureSoc!ets ayer 6SS7 developed by etscape.
• SS ma!es use of digital certicates to authenticatetransactions. Most credit card transactions are protected bySS.
• Another authenticity system is Secure Electronic Transaction6SET7. This is a payment mechanism for conrming authenticityof both buyer and seller.
• Each party to a transaction has to obtain a digital certicatefrom a registered certication authority 6the post oce and BTare t"o e;amples of these7. The certicate is contained "ithina relevant machine( and the credit card details contained"ithin it can only be decrypted by the issuing card company
top related