Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

37
Electronic Business Systems Yong Choi School of Business CSU, Bakersfield

Transcript of Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Page 1: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Electronic Business Systems

Yong Choi

School of Business

CSU, Bakersfield

Page 2: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Batch Processing (Periodic Mode)

• Batch processing: the aggregation of several business events over some period of time with the subsequent processing of these data as a group by the information system.– Gather all the sales transaction data and update over

night

– Getting rare

– Example: pay roll

Page 3: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Batch Processing of Accounting Data

Page 4: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Online Transaction Entry (OLTE)

• Enter business events directly, using computer input device or PC, into the information system at the time and place the event occurs.– Merges the traditional subprocesses of business

event occurrence (usually eliminating a source document) and record business event data.

– Considered online because the data entry device is connected to the computer.

Page 5: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Online Transaction Entry (Batch)

Page 6: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Online Real-Time (OLRT)

• Gather and record business event data at time of occurrence.

• Update master data instantaneously.• Provide results in real time.• Also known as immediate mode in which

little or no delay occurs between any two data processing steps.

Page 7: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Online Real-Time Processing

Page 8: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

INTRODUCTION

• OLTP (online transaction processing)– Supports operational processing– Sales orders, accounts receivable, etc– Supported by operational databases & DBMSs

• OLAP (online analytical processing)– Helps build business intelligence– Supported by data warehouses and data-mining

tools

3-8

Page 9: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

OLTP, OLAP, and Business Intelligence

3-9

BI tools•DMS•KMS

Page 10: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

BUSINESS INTELLIGENCE

• Business intelligence (BI) – collective information about customers, competitors, business partners, competitive environment, and your internal operations for making important, effective, and strategic business decisions

• Hot topic in business today• Current market is $50 billion and double-digit

annual growth

3-10

Page 11: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

BI Objectives

• Help people understand– Capabilities of the organization– State of the art trends and future directions of

the market– Technological, demographic, economic,

political, social, and regulatory environments in which the organization competes

– Actions of competitors

3-11

Page 12: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Viewing Business Intelligence

• Digital dashboard – displays key information gathered from several sources in a format tailored to the needs and wants of an individual

3-12

Page 13: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

DATA WAREHOUSES AND DATA MINING

• Help you build and work with business intelligence and some forms of knowledge

• Data warehouse – collection of information (from many places) that supports business analysis activities and decision making

3-13

Page 14: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Data Warehouse Characteristics

• Multidimensional– Rows, columns, and layers

• Support decision making, not transaction processing– Contain summaries of information– Not every detail

3-14

Page 15: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Data-Mining Tools

• Data-mining tools – software tools you use to query information in a data warehouse

3-15

Page 16: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Data-Mining Tools

• Query-and-reporting tools – similar to QBE tools, SQL, and report generators

• Intelligent agents – utilize AI tools to help you “discover” information and trends

• Multidimensional analysis (MDA tools) – slice-and-dice techniques for viewing multidimensional information

• Statistical tools – for applying mathematical models to data warehouse information

3-16

Page 17: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Data Marts• Data mart – subset of a data warehouse in

which only a focused portion of the data warehouse information is kept

3-17

Page 18: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Definition of EC

• Electronic commerce (EC) is an emerging concept that describes the buying and selling of products, services and information via and the Internet and computer networks (EDI).

• E-Business?

Page 19: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

EC vs. Traditional Commerce

Page 20: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

History of EC

• 1970s: Electronic Funds Transfer (EFT)– Used by the banking industry to exchange account information over

secured networks

• Late 1970s and early 1980s: Electronic Data Interchange (EDI) for e-commerce within companies– Used by businesses to transmit data from one business to another

• 1990s: the World Wide Web on the Internet provides easy-to-use technology for information publishing and dissemination– Cheaper to do business (economies of scale)

– Enable diverse business activities (economies of scope)

Page 21: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Why business is interested in EC?

• Not just save cost and increase productivity– Paper check Vs. E-check

• Change the nature of competition– Etrade.com / Amazon.com

• Create new businesses– Citrix.com / Priceline.com

Page 22: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Ecommerce infrastructure

• Information superhighway infrastructure– Internet, LAN, WAN, routers, etc.

– telecom, cable TV, wireless, etc.

• Messaging and information distribution infrastructure– HTML, XML, e-mail, HTTP, etc.

• Common business infrastructure– Security, authentication, electronic payment,

directories, catalogs, etc.

Page 23: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

E-COMMERCE BUSINESS MODELS

5-23

Page 24: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Some examples

• B2B: GM and suppliers (SCM)

• B2C: Amazon

• C2B: Priceline

• C2C: ebay

• G2C: Paying tax, Vehicle registration

• B2G: Lockheed (prodcuts/services to DoD)

Page 25: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

25

Intranet

• A private version of the Internet

• Use TCP/IP

• A network that uses a Web Browser as a universal applications client and that is accessible only by individuals within a particular enterprise

Page 26: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Public/ExternalInternet Users

Intranet

Clients

ServersERP

Legacy systems

E-mail servers

Web servers

Databases

Firewalls

26

The Intranet (cont.)

Page 27: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

27

Extranet

• A collection of Intranets (known as extended Intranet)

• Also use TCP/IP

• A network that links business partners to one another over the Internet by tying together their corporate intranet

Page 28: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

28

Enterprise

ConsumersSuppliers

Clients

Business Partners

Distributors

VPN

Internet

Intranet

Extranet

IntranetIntranet

Intranet

Intranet

VPN VPN

VPN

VPN

RemoteEmployees

The Extranet (cont.)

Page 29: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

29

E-Commerce Security

• Cryptography– Encryption and decryption of

information

• Secret Key (symmetric) Cryptography

• Public Key (asymmetric) Cryptography

• Digital Signature

Page 30: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Cryptography• Any information (such as order) in cyberspace

must be delivered securely using cryptography technology.

• History of Cryptography

• Rewrite contents (encryption) so that they cannot be read without key

– Encrypting function: Produces encrypted message – Decrypting function: Extracts original message

• Method– Secret key Cryptography– Public key Cryptography– Digital signature

Page 31: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

31

Secret Key Cryptography

• Use a single key– Key: a set of random numbers to encrypt/decrypt

information

• Known as symmetric encryption or private key encryption

• The same key is used by sender and receiver• Easy to use, suitable when only two distinctive

parties are involved• Less secure (than public key cryptography),

when many parties are involved

Page 32: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

32

Secret Key Cryptography (symmetric)

Scrambled Message

Original Message

Sender

InternetScrambled Message

Keysender (= Keyreceiver)

Encryption

Original Message

Receiver

Keyreceiver

Decryption

Page 33: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

33

Public Key Cryptography

• Use a pair of key (public and private)• Known as asymmetric encryption • The public key

– Known to all authorized users

• The private key– Known only to key’s owner

• Easy to use, more secure (than secret key cryptography), suitable when many parties are involved

• Requires sharing of both keys

Page 34: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

34

Sender

Original Message

Scrambled Message

Scrambled Message

Public Keyreceiver

Original Message

Receiver

Private Keyreceiver

Internet

Public Key Cryptography Mechanism

Message

Page 35: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

35

Digital Signature

• Public key cryptography problem– Receiver cannot ensure that a

message is actually coming from sender. • Your subordinate can send a fake

message using your email system - which looks originated from “REAL” you.

Page 36: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

36

Digital Signature

• Goal

– Guarantee that message must have originated with a certain entity (increase security)

• Idea

– Encrypt digital signature with private key– Decrypt digital signature with public key

• Only owner of private key could have generated original signature

Page 37: Electronic Business Systems Yong Choi School of Business CSU, Bakersfield.

Sender

Original Message

Scrambled Message

Scrambled Message

Private Keysender

Original Message

Receiver

Public Keysender

Internet

Digital Signature

DigitalSignature