REVIEW FOR EXAM 3Information Systems For E-BusinessSlide 3Slide 4Components of E-BusinessE-Business ModelsB2C ModelsB2C Models (continued)Slide 9B2B ModelsC2C ModelsE-Government Business ModelsE-Business IssuesSecuritySlide 15Summary QuestionsInformation Systems For Decision-MakingThe Decision-Making ProcessIntelligence PhaseDesign PhaseChoice PhaseDecision Support SystemsModeling Tools and TechniquesGroups Decision Support SystemsExecutive Information SystemsSlide 26KWS. Expert SystemsExpert Systems ComponentsSlide 29Information Systems For Business IntegrationBusiness Integration?Systems for Horizontal IntegrationIntegrating Internal Processes with ERPVertical Integration with suppliersSystems for Vertical IntegrationElectronic Data Interchange (EDI)Slide 37Supply Chain Management (SCM)Vertical Integration with customersSlide 40CRM softwareSlide 42Information Systems For Strategic AdvantageValue Chain?Slide 45Slide 46Porter’s Value Chain Analysis toolPorter’s Competitive Forces Model: Dealing with external factorsPorter’s Competitive Forces ModelSlide 50Managing the Development and Purchase of ISTraditional Systems Development Life Cycle (SDLC)SDLC: RecapSlide 54PrototypingSlide 56Joint Application Development (JAD)Slide 58Slide 59Rapid Application Development (RAD)Slide 61Object-Oriented Analysis and Design (OOAD)Purchasing SoftwareRequest for Proposals (RFP)Slide 65Evaluating ProposalsSlide 671REVIEW FOR EXAM 3BUS3500 - Abdou Illia, Spring 20052Information Systems For E-BusinessPart 13What technologies would helpimplement your E-Business model?What technologies would take care of my concerns?What kind of issues/concernsyou have to deal with?Who are you? How far you can go digital?- What product/service?- How customers find, purchase, pay prod./serv.- How product/service are delivered?Who are your customers?E-BusinessTria n gle4E-Business TechnologiesWeb designTCP/IPJavaFirewallsElectronic Payments,Online BillingEncryptionE-Business IssuesCopyrightPrivacySecurityIntellectual PropertyTaxationTrustJurisdictionE-Business modelsB2BB2CC2CE-Gvt: G2B, G2CE-BusinessTrian gle5Components of E-BusinessEach component could be Physical or Digital.The extent to which a Business is an e-Business depends on the extent to which the components are digital.Processes: Process of finding the product, purchasing and paying.6E-Business ModelsBusiness-to-Consumer – B2CBusiness sells product directly to the consumer.Business-to-Business – B2BBusinesses sell to other businesses.Consumer-to-Consumer – C2CConsumers sell directly to other consumers.7B2C ModelsSubscription Consumers pay to have regular access to site.Consumersreports.comOnline storefrontWeb site acts as intermediary between manufacturer and consumer.Amazon.com8B2C Models (continued)Bricks-and-clicksCombines a traditional retail outlet with an online storefrontCircuitCity.comAdvertisingSell advertising space on web site to other companiesSports.yahoo.com9B2C Models (continued)Internet presenceUse web presence to provide information about products and servicesExxon.comIntermediaryNew types of intermediaries connect buyers and sellersE-Trade.com10B2B ModelsB2B is much larger than B2CSize estimates range from $543 Billion to $6.8 TrillionIncrease 50% per yearInformation exchangesExchange business documents over the InternetEDI via the InternetDirect sellersDirect sales model, direct to other businessesDell Premier pagesCiscoNew intermediariesVirtual hubs match buyers and sellersE-Hospitality11C2C ModelsOnline garage salesOnline auctionsAllows consumers to buy and sell goods with other consumersEBay.comC2C servicesSell expertise directly to other customersKeen.comOnline communitiesAllow people with similar interests to come togetherChat roomsDiscussion boards12E-Government Business ModelsGovernment-to-citizen (G2C)Provide government services to citizens over the InternetVehicle registration renewalOnline votingGovernment-to-business (G2B)Helps government and business work together more efficientlyReduces paperwork and costs for business and government13E-Business IssuesE-Business raises a number of difficult legal, social, and ethical issuesProtection of intellectual propertyTaxation of e-business transactionsJurisdiction – whose laws apply when a transaction crosses many international boundariesTrustTRUSTe14SecurityHackers: who attempts to gain unauthorized access to a computer systemSpoofing (spoof attacks)Denial of service attacksDistributed denial of service attacksPing of Death attacks1516Summary QuestionsMalaga Notes1) What are the three elements of the e-business triangle? 2) (a) Which business model do online auction sites use? (b) Which ones governments use?3) (a) What is a Denial of service attack? What is a spoof attack? What is a Ping of Death attack?4) Do Encryption protect the data stored on a server computer?17Information Systems For Decision-MakingPart 218The Decision-Making ProcessSimon’s model of the decision-making processIntelligenceDesignChoice19Intelligence PhaseScan the environment for a problem.Determine if decision-maker can solve the problem.Within scope of influenceFully define the problem by gathering more information about the problem.Scan Environment forproblem to be solvedor decision to be madeData sourceMISProblem ?ENDProblem within scope of influence?NoYesENDNoGather more informationabout the problemInternal & External data20Design PhaseDevelop a model of the problem.Determine type of model.Verify model.Develop and analyze potential solutions.Develop a model ofproblem to be solvedVerify that the model is accurateDevelop potentialsolutions21Choice PhaseSelect the solution to implement.More detailed analysis of selected solutions might be needed.Verify initial conditions.Analyze proposed solution against real-world constraints.22Decision Support SystemsMajor componentsData management subsystemInternal and external data sourcesModel management subsystemTypically mathematical in natureUser interfaceHow the people interact with the DSSData visualization is the keyTextGraphsChartsUserInterfaceModel Management- Sensitivity Analysis- What-if Analysis- Simulation- Goal-seeking AnalysisData Management- Transactional Data-
View Full Document