slide 3-1 chapter 3 electronic commerce and internet technologies introduction to information...
TRANSCRIPT
Slide 3-Slide 3-11
Chapter 3Chapter 3
Electronic Commerce and Internet Technologies
Introduction to Information Systems
Judith C. Simon
Slide 3-Slide 3-22
"Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. "Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without in Section 117 of the 1976 United States Copyright Act without
the express written permission of the copyright owner is the express written permission of the copyright owner is unlawful. Request for further information should be addressed unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no and not for distribution or resale. The Publisher assumes no
responsibility for errors, omissions, or damages, caused by the responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information use of these programs or from the use of the information
contained herein."contained herein."
Slide 3-Slide 3-33
Chapter 3 Major TopicsChapter 3 Major Topics
Electronic data interchangeElectronic data interchange Introduction to the InternetIntroduction to the Internet Business examples of Internet electronic Business examples of Internet electronic
commercecommerce Security issues of Internet electronic commerceSecurity issues of Internet electronic commerce Expected growth of Internet electronic commerceExpected growth of Internet electronic commerce Additional Internet technologiesAdditional Internet technologies
Slide 3-Slide 3-44
Electronic Commerce (E-Commerce) OverviewElectronic Commerce (E-Commerce) Overview
Also called e-businessAlso called e-business Refers to commercial transactions in electronic Refers to commercial transactions in electronic
formform
Slide 3-Slide 3-55
Communications SoftwareCommunications Software
Manages transmission of data between computers Manages transmission of data between computers (provides appropriate instructions to hardware)(provides appropriate instructions to hardware)
Used to transfer files and to send messages Used to transfer files and to send messages (electronic mail)(electronic mail)
Available with some operating systems, as well as Available with some operating systems, as well as with some related hardware such as a modem, or with some related hardware such as a modem, or as a separate purchaseas a separate purchase
Slide 3-Slide 3-66
Electronic Data Interchange (EDI)Electronic Data Interchange (EDI)
Has been in use for several decades (longer than Has been in use for several decades (longer than business uses of the Internet have existed)business uses of the Internet have existed)
Purpose/use is to send data over communication Purpose/use is to send data over communication lines as secure, direct links between organizationslines as secure, direct links between organizations
Slide 3-Slide 3-77
Internet IntroductionInternet Introduction
InternetInternet: international network of networks: international network of networks Overall cost of communication is considered low, Overall cost of communication is considered low,
but some parts of the world lack the needed but some parts of the world lack the needed technologytechnology
TCP/IPTCP/IP: set of protocols (rules) used for Internet : set of protocols (rules) used for Internet transmissionstransmissions
Security of messages and data continues to be a Security of messages and data continues to be a concernconcern
Slide 3-Slide 3-88
Internet AccessInternet Access
ISPISP: Internet Service Provider, such as AOL: Internet Service Provider, such as AOL DomainDomain: Type of organization providing access, : Type of organization providing access,
such as .com (commercial) or .edu (educational)such as .com (commercial) or .edu (educational) Email address patternEmail address pattern: [email protected]: [email protected]
example: [email protected]: [email protected] example: [email protected]: [email protected]
Slide 3-Slide 3-99
World Wide Web (WWW or “Web”)World Wide Web (WWW or “Web”)
Designed in 1989 to help researchers to Designed in 1989 to help researchers to collaborate over the Internetcollaborate over the Internet
HypertextHypertext: links that can take the user directly to : links that can take the user directly to other data stored locally or externallyother data stored locally or externally
HypermediaHypermedia: use of nontext media, such as : use of nontext media, such as images, sound, animationimages, sound, animation
Slide 3-Slide 3-1010
World Wide Web, continuedWorld Wide Web, continued
HTMLHTML: Hypertext markup language, the basic : Hypertext markup language, the basic code used developing for Web pagescode used developing for Web pages
HTTPHTTP: Hypertext transfer protocol, rules for : Hypertext transfer protocol, rules for distributing or transmitting hypertext files (Web distributing or transmitting hypertext files (Web pages)pages)
BrowserBrowser: software (e.g., Netscape, Internet : software (e.g., Netscape, Internet Explorer) used to retrieve HTML documents and Explorer) used to retrieve HTML documents and display them on a computer screen; has capability display them on a computer screen; has capability of interpreting code and handling hyperlinksof interpreting code and handling hyperlinks
Slide 3-Slide 3-1111
Management Concerns - World Wide WebManagement Concerns - World Wide Web
Is developing and maintaining a home page worth Is developing and maintaining a home page worth the time and expense involved to the organization?the time and expense involved to the organization?
Can business transactions be processed safely?Can business transactions be processed safely? Is employee access to the Web worth the expense? Is employee access to the Web worth the expense?
If so, which employees need access? Should If so, which employees need access? Should access be restricted or monitored?access be restricted or monitored?
Slide 3-Slide 3-1212
Security Issues of E-CommerceSecurity Issues of E-Commerce
Digital certificatesDigital certificates: used for identification and for : used for identification and for exchanging with another party for security of exchanging with another party for security of transactionstransactions
Both Both public and private certificatespublic and private certificates are available. are available. Public may be used for identification as a Public may be used for identification as a customer purchasing products online. Private is customer purchasing products online. Private is often used when access is limited to specified often used when access is limited to specified persons, who can be provided with the private persons, who can be provided with the private certificates. A combination of both types may be certificates. A combination of both types may be used for additional security.used for additional security.
Slide 3-Slide 3-1313
Electronic Mail (email)Electronic Mail (email)
EmailEmail: sending and receiving messages by : sending and receiving messages by computer system; very widely used in businesses computer system; very widely used in businesses and homesand homes
Electronic eavesdroppingElectronic eavesdropping: reading and perhaps : reading and perhaps storing (without permission) messages sent to storing (without permission) messages sent to someone elsesomeone else
Emoticon (emotional icon)Emoticon (emotional icon): used to indicate : used to indicate intended feelings, e.g., :-) = smile to indicate intended feelings, e.g., :-) = smile to indicate intended humorintended humor
Slide 3-Slide 3-1414
Electronic MailElectronic Mail
An advantage:An advantage: Messages can be sent and responses received very Messages can be sent and responses received very
quickly.quickly.
A disadvantage:A disadvantage: Confidentiality is not ensured: for example, a message Confidentiality is not ensured: for example, a message
intended to be private could be forwarded to 1000 intended to be private could be forwarded to 1000 additional persons.additional persons.
Slide 3-Slide 3-1515
Electronic Mail EmoticonsElectronic Mail Emoticons
How would you interpret these emoticons if seen How would you interpret these emoticons if seen in a message you received?in a message you received? :-K:-K :-@:-@ :’-(:’-( *:O)*:O) C=:-)C=:-) :-I:-I :-\:-\ ‘:-)‘:-)
Slide 3-Slide 3-1616
Electronic Mail EmoticonsElectronic Mail Emoticons
Typical intended meanings of certain emoticons:Typical intended meanings of certain emoticons: :-K :-K beats mebeats me :-@ :-@ screamingscreaming :’-(:’-( cryingcrying *:O) *:O) clowningclowning C=:-)C=:-) cookingcooking :-I :-I HmmmHmmm :-\:-\ skepticalskeptical ‘:-)‘:-) devilishdevilish
Slide 3-Slide 3-1717
Management Concerns - Electronic MailManagement Concerns - Electronic Mail
Are employees using email capabilities only for Are employees using email capabilities only for intended purposes?intended purposes?
Have procedures been provided identifying Have procedures been provided identifying specific usage policies?specific usage policies?
Should employee email messages be monitored?Should employee email messages be monitored?
Slide 3-Slide 3-1818
TelecommutingTelecommuting
TelecommutingTelecommuting: employee working at home and : employee working at home and transferring data to and from officetransferring data to and from office
TeleworkingTeleworking: form of telecommuting referring to : form of telecommuting referring to working away from the office but not necessarily working away from the office but not necessarily to home (“telecommuting” is sometimes used to to home (“telecommuting” is sometimes used to refer to this option, too)refer to this option, too)
Virtual officeVirtual office: seeming to be conducting business : seeming to be conducting business from an office, without needing to be in any one from an office, without needing to be in any one locationlocation
Slide 3-Slide 3-1919
Telecommuting, continuedTelecommuting, continued
Advantages include reduction in travel time and Advantages include reduction in travel time and travel cost, pollution, ability to work any time of travel cost, pollution, ability to work any time of day or night, reduction in needed office spaceday or night, reduction in needed office space
Disadvantages include problems with supervision Disadvantages include problems with supervision of employees, lack of social interaction, of employees, lack of social interaction, inappropriateness for some types of jobsinappropriateness for some types of jobs
Slide 3-Slide 3-2020
File Transfer Protocol (FTP)File Transfer Protocol (FTP)
FTPFTP: rules used to transfer files from one location : rules used to transfer files from one location to anotherto another
Software is available for this use, such as Software is available for this use, such as WS_FTP.WS_FTP.
Browsers can also be used to access files. Instead Browsers can also be used to access files. Instead of using HTTP:// preceding a desired Web of using HTTP:// preceding a desired Web address, FTP:// is used to indicate the rules to use address, FTP:// is used to indicate the rules to use preceding the name and location of the desired filepreceding the name and location of the desired file
Slide 3-Slide 3-2121
NewsgroupsNewsgroups
NewsgroupsNewsgroups: discussion areas available on a : discussion areas available on a continually expanding, wide range of topics. continually expanding, wide range of topics. People who access a newsgroup can simply read People who access a newsgroup can simply read information provided by others or can add (“post”) information provided by others or can add (“post”) their own information to the newsgroup.their own information to the newsgroup.
Newsgroups have several main categories of Newsgroups have several main categories of topics, as well as subcategories separated by dots, topics, as well as subcategories separated by dots, e.g., misc.jobs.offerede.g., misc.jobs.offered
FAQsFAQs: frequently asked questions; these should be : frequently asked questions; these should be read before contributing to a newsgroupread before contributing to a newsgroup
Slide 3-Slide 3-2222
Mailing ListsMailing Lists
Also called “Also called “LISTSERVsLISTSERVs”” Use email for discussions; messages go to Use email for discussions; messages go to
everyone who has subscribed. May be moderated everyone who has subscribed. May be moderated or unmoderated. If unmoderated, no one screens or unmoderated. If unmoderated, no one screens messages before they are transmitted to list.messages before they are transmitted to list.
SpammingSpamming: using mailing lists to send undesired : using mailing lists to send undesired materials such as advertisements to those on materials such as advertisements to those on mailing listmailing list
Slide 3-Slide 3-2323
IntranetsIntranets
IntranetIntranet: use of Internet technology for : use of Internet technology for communication within an organization. Web communication within an organization. Web pages are used to provide internal data. Usually pages are used to provide internal data. Usually quicker and less expensive to change/update than quicker and less expensive to change/update than printed materials. printed materials.
FirewallFirewall: form of security to prevent outsiders : form of security to prevent outsiders from accessing internal data or to restrict internal from accessing internal data or to restrict internal users to particular sectionsusers to particular sections
Slide 3-Slide 3-2424
ExtranetsExtranets
ExtranetExtranet: use of Internet technology for : use of Internet technology for communication between organizations, where the communication between organizations, where the outside organization has access to designated parts outside organization has access to designated parts of the intranet, e.g., for monitoring inventory and of the intranet, e.g., for monitoring inventory and the need for materials/suppliesthe need for materials/supplies