Welcome to my blogger which include the summary of many information which we take in our course. The summary has many important point which the Dr focus in it, so the blogger will give you the information which you want about information system. ( i keep it as point)

Sunday, 10 May 2015

Chapter 7: E-Commerce: Applications and Issues

Discuss the five online services of business-to-consumer electronic commerce, provide a specific example of each service, and state how you have used or would use each service.


Electronic banking, also known as cyberbanking, involves conducting various banking activities from home, at a place of business, or on the road instead of at a physical bank location. Online securities trading involve buying and selling securities over the web. Online job matching over the web offers a promising environment for job seekers and
for companies searching for hard-to-find employees. Thousands of companies and government agencies advertise available positions, accept resumes, and take applications via the internet. The Internet is an ideal place to plan, explore, and arrange almost any trip economically. Online travel services allow you to purchase airline tickets, reserve hotel rooms, and rent cars. Most sites also offer a fare-tracker feature that sends you e-mail messages about low-cost flights. Online advertising over the web makes the advertising process media-rich, dynamic, and interactive.
We leave the examples to you.



Describe the three business models for business-to-business electronic commerce, and provide a specific example of each model.


          In the sell-side marketplace model, organizations attempt to sell their products or service to other organizations electronically from their own private c-marketplace website and/or from a third-party website. Sellers such as Dell Computer (www.dellauction.com) use sell- side auctions extensively. In addition to auctions from their own websites, organizations can use third-party auction sites, such as eBay, to liquidate items. The buy-side marketplace is a model in which organizations attempt to buy needed
products or services from other organizations electronically. E-marketplaces, in which there are many sellers and many buyers, arc called public exchanges, or just exchanges. Public exchanges are open to all business organizations. They frequently arc owned and operated by a third party. There are three basic types of public exchanges: vertical, horizontal, and functional. Vertical exchanges connect buyers and sellers in a given industry (e.g., www.plcifiticsnet.com in the plastics industry). Horizontal exchanges connect buyers and sellers across many industries (e.g., Worldbid. com, www.worldhid.com). In functional exchanges, needed services such as temporary help or extra office space arc traded on an "as-needed" basis (e.g., Employease, www. employeaw.com).

Chapter 6: Networks

Define the term computer network, and compare and contrast the two major types of networks.
A computer network is a system that connects, computers via communications media so that data and information can be transmitted among them. The two major types of networks are local area networks (LANs) and wide area networks (WANs). LANs encompass a limited geographic area and usually are composed of one communications medium. In contrast, WANs encompass a broad geographical area and usually are composed of multiple communications media.
 Describe the differences among the three types of wire line communications media, and discuss the main advantages and disadvantages of each type.
Twisted-pair wire, the most prevalent form of communications wiring, consists of strands of copper wire twisted in pairs. It is relatively inexpensive to purchase, widely available, and easy to work with. However, it is relatively slow for transmitting data, it is subject to interference from other electrical sources, and it can easily be tapped by unintended receivers. Coaxial cable consists of insulated copper wire. It is much less susceptible to electrical interference than is twisted-pair wire, and it can carry much more data. However, coaxial cable is more expensive and more difficult to work with than twisted-pair wire. It is also somewhat inflexible



 Differentiate between the Internet and the World Wide Web, and describe the most common methods for accessing the Internet.
The internet is a global network of computer networks, using a common communications protocol. TCP/IP. The World Wide Web is a system that stores, retrieves, formats, and displays information accessible through a browser.
Methods for connecting to the Internet include dial-up, DSL, cable modem, satellite, wireless, and fiber to the home.  Identify six major categories of network applications, provide an example of each, and explain how that application supports business functions.
• Discovery involves browsing and information retrieval, and provides users the ability to view information in databases, download it, and/or process it. Discovery tools include search engines, directories, and portals. Discovery tools enable business users to efficiently find needed information.
• Network provide fast, inexpensive communications, via e-mail, call centers, chat rooms, voice communications, and blogs. Communications tools provide business users with a seamless interface among team members, colleagues, business partners and customers.
• Collaboration refers to mutual efforts by two or more entities (individuals, groups, or companies) who work together to accomplish tasks. Collaboration is enabled by workflow system. Collaboration tools enable business users to collaborate with colleagues, business partners, and customers. 

Chapter 5: Managing Knowledge and Data

Identify three common challenges in managing data. And describe one way organizations can address each challenge using data governance.
Three common challenges in managing delta are:
• Data are scattered throughout organizations and are collected by many individuals using vinous methods and devices. These data are frequently stored in numerous servers and locations and in different computing systems, databases, formats, and human and computer languages.
• Data come from multiple sources.
• Information system that support particular business processes imposes unique requirements on data, which results in repetition and conflicts across an organization.





One strategy for implementing data governance is master data management. Master data management provides companies with the ability to store, maintain, exchange, and synchronize a consistent, accurate, and timely "single version of the truth" for the company's core master data. Master data management consistently manages data gathered from across an organization, data from multiple sources, and data across business processes in an organization.

 Name six problems that can be minimized by using the database approach.
The database approach minimizes the following problems: data redundancy, data isolation, data inconsistency, data security, data integrity, and data independence.
Demonstrate how to interpret relationships depicted in an entity- relationship diagram.
See Figures 53 and 5.4 for a demonstration of interpreting relationships in an ER diagram.



Discuss at least one main advantage and one main disadvantage of relational databases.
Relation database enable people to compare information quickly by row or column. In addition, users can retrieve items by finding the point of intersection of a particular row and column. However, large-scale relational databases can be composed of many interrelated tables, making the overall design complex with slow search and access times.


Chapter 4: Information Security

The five factors that contribute to the increasing vulnerability of information resources:
·       Today's interconnected, wirelessly networked business environment.  Example: the internet
·       Smaller, faster, cheaper computer and storage device.    Example: netbook, thumb drives, ipads
·       Decreasing skills necessary to be a computer hacker.      
Example: information system hacking programs circulating on the internet.
·       Information organized crime taking over cybercrime.  
 Example: organized crime has formed transnational cybercrime cartels.
·       Lack of management support.


 Define the three risk mitigation strategies, and provide an example of
each one in the context of owning a home.

The three risk mitigation strategies are:
     Risk acceptance, where the organization accepts the potential risk, continues operating with no controls, and absorbs any damages that occur. If you own a home, you may decide not to insure it. Thus, you are practicing risk acceptance. Clearly, this is a bad idea. Risk limitation, where the organization limits the risk by implementing controls that minimize the impact of threats. As a homeowner, you practice risk limitation by putting in
an alarm system or cutting down weak trees near your house. Risk transference, where the organization transfers the risk by using other means to compensate for the loss, such as by purchasing insurance. The vast majority of homeowners practice risk transference by purchasing insurance on their houses and other possessions. 

CHAPTER 3: Ethics and Privacy

Define ethics, list and describe the three fundamental tenets of ethics. and describe the four categories of ethical issues related to information technology.



Ethics refers to the principles of right and wrong that individuals use to make choices that guide their behavior.
Fundamental tenets of ethics include responsibility, accountability, and liability. Responsibility means that you accept the consequences of your decisions and actions. Accountability refers to determining who is responsible for actions that were taken. Liability is a legal concept that gives individuals the right to recover th e damages done to them by other individuals, organizations, or systems. The major ethical issues related to IT are privacy, accuracy, property (including intellectual property), and access to information. Privacy may be violated when data are held in databases or transmitted over networks. Privacy policies that address issues of data collection, data accuracy, and data confidentiality can help organizations avoid legal problems.

Identify three places that store personal data, and for each one, discuss at least one personal threat to the privacy of the data stored there.

Privacy is the right to be left alone and to be free of unreasonable personal intrusions. Threats to privacy include advances in information technologies, electronic surveillance personal information in databases, Internet bulletin boards, newsgroups, and social networking sites. 71hc privacy threat in Internet bulletin boards, newsgroups, and social networking sites is that you insight post too much personal information that many unknown people can see.