Escolar Documentos
Profissional Documentos
Cultura Documentos
22-04-2016
IS Planning Components
IS Planning Components
CONSOLIDATED SUMMARY
22-04-2016
Analysis
Testing
meets the requirements that guided its design
and development,
responds correctly to all kinds of inputs,
performs its functions within an acceptable time,
is sufficiently usable,
can be installed and run in its intended
environments, and
achieves the general result its stakeholders
desire.
10
Implementation
Testing
software testing typically attempts to execute a
program or application with the intent of
finding software bugs (errors or other defects)
One common source of expensive defects is
requirement gaps, e.g., unrecognized
requirements which result in errors of omission
by the program designer.
11
12
CONSOLIDATED SUMMARY
22-04-2016
Implementation (continued)
Support
13
14
Systems Integration
Security
Systems integration:
Examines the needs of entire organization
Produces a plan to combine disparate systems to
allow data to flow between units
15
Security Token
In early 2006, PayPal introduced an
optional security key as an additional
precaution against fraud.
A user account tied to a security key has a modified
login process. The account holder enters his or her
login ID and password as normal, but is then
prompted to press the button on the security key and
enter the six-digit number generated by it.
Security:
Policies, procedures and technical
measures used to
prevent unauthorized access,
alteration, theft, and
physical damage to information systems,
resources and assets
18
CONSOLIDATED SUMMARY
22-04-2016
Controls:
Methods, policies, and organizational
regulations
that ensure safety of organizations
assets;
accuracy and reliability of its accounting
records;
and operational adherence to statutory &
management standards
19
Social engineering:
Tricking employees into revealing their passwords by
pretending to be legitimate members of the company
in need of information
21
Types of controls
Software controls
Hardware controls
Computer operations controls
Data security controls
Implementation controls
Administrative controls
22
23
CONSOLIDATED SUMMARY
22-04-2016
Encryption:
Transforming text or data into cipher text
that cannot be read by unintended
recipients
Two methods for encryption on networks
Secure Sockets Layer (SSL) and successor
Transport Layer Security (TLS)
Secure Hypertext Transfer Protocol
(S-HTTP)
25
E-COMMERCE
1. UBIQUITY (24 x 7)
9. NON-CASH PAYMENTS
2. GLOBAL REACH
3. UNIVERSAL STANDARDS
4. RICHNESS
5. INTERACTIVE
6. INFORMATION DENSITY
7. PERSONALIZATION /
CUSTOMIZATION
8. SOCIAL TECHNOLOGY
26
Accounting perspective
Query perspective
Analysis perspective
Control perspective
Reporting
Intangibility
Inseparability
Non-storable
Inconsistency
CONSOLIDATED SUMMARY
22-04-2016
2. Transition to
service
Enquiry process
Data capture
Service scope definition
3. Pre-service
Pre-service processing
Input processing
Integration
4. Service delivery
Service processing by stages
Service documents
processing
5. Post service
feedback
Billing and closure
Database update
Feedback process
Services Applications
Digital Markets
Digital markets reduce
Information asymmetry
Search costs
Transaction costs
Menu costs
Digital markets enable
Target discrimination
Dynamic pricing
Disintermediation
Display ads
Rich media
Video ads
Search engine advertising
Social network, blog, and game advertising
Sponsorships
Referrals (affiliate relationship marketing)
E-mail marketing
Online catalogs
Slide 7-34
33
Behavioral Targeting
Interest-based advertising
Data aggregators develop profiles
Search engine queries
Online browsing history
Offline data (income, education, etc.)
Impressions
Click-through rate (CTR)
View-through rate (VTR)
Hits
Page views
Stickiness (duration)
Unique visitors
Loyalty
Reach
Recency
Slide 7-36
CONSOLIDATED SUMMARY
22-04-2016
E-mail metrics
Acquisition rate
Conversion rate
Browse-to-buy-ratio
View-to-cart ratio
Cart conversion rate
Checkout conversion rate
Abandonment rate
Retention rate
Attrition rate
Open rate
Delivery rate
Click-through rate
(e-mail)
Bounce-back rate
E-commerce: Models
Types of e-commerce
Business-to-business (B2B)
Business-to-consumer (B2C)
Consumer-to-consumer (C2C)
Government-to-government (G2G)
Government-to-citizen (G2C)
Business-to-government (B2G)
=========================================
Mobile commerce (m-commerce)
Paperless, currency-less platforms (non-cash)
Slide 7-37
38
ONLINE SHOPPING
39
CONFIDENTIALITY
INTEGRITY
AVAILABILITY
AUTHENTICITY
NON-REPUDIABILITY
AUDITABLE
OTHERS
41
Credit Card
Debit Card
Smart Card
E-Money
Electronic Fund Transfer (EFT)
COD
40
ECOMMERCE SECURITY
ENCRYPTION
CONSOLIDATED SUMMARY
22-04-2016
E-commerce marketing
44
43
B2B Trading
Proprietary Technologies
Proprietary technology: intellectual property of
developer, not free for all to use
Examples:
Local search engine
Shopping cart applications
Wish lists
Video streaming tools
Tools to analyze and predict Web visitor
behavior, especially shopper behavior
46
CONSOLIDATED SUMMARY
22-04-2016
Considerations in Selecting
a Web Host
49
Considerations in Selecting
a Web Host (continued)
Web-Based Business
Business success depends on availability and
use of software
Elements needed to support B2C commerce:
50
Targeting customers
Capturing the customers complete experience
Personalizing the service
Shortening the business cycle
Let customers help themselves
Be proactive and de-commoditize
Setup fees
Traffic-based fees
Monthly fees
One time vs recurring
51
52
Customer Experience
53
CONSOLIDATED SUMMARY
22-04-2016
Demand Management
Payment Gateways
10
CONSOLIDATED SUMMARY
22-04-2016
A bank customer can perform some nontransactional tasks through online banking,
including viewing account balances
viewing recent transactions
downloading bank statements, for example
in PDF format
viewing images of paid cheques
ordering cheque books
download periodic account statements
Downloading applications for M-banking, E-banking
etc.
REFER
TEXT BOOK
FOR DETAILS
65
11