Se ha denunciado esta presentación.
Se está descargando tu SlideShare. ×

Bba ii cam u iv-information systems application & computer security

Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Anuncio
Próximo SlideShare
Introduction to e commerce
Introduction to e commerce
Cargando en…3
×

Eche un vistazo a continuación

1 de 53 Anuncio
Anuncio

Más Contenido Relacionado

Presentaciones para usted (20)

A los espectadores también les gustó (20)

Anuncio

Similares a Bba ii cam u iv-information systems application & computer security (20)

Más de Rai University (20)

Anuncio

Más reciente (20)

Bba ii cam u iv-information systems application & computer security

  1. 1. Information Systems Application & Computer Security Course:-B.B.A.-II Subject: Computer Applications in Management Unit:-4
  2. 2. Cloud Computing With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our own pc.  Although documents can be accessed from other computers on the network, they can’t be accessed by computers outside the network. This is PC-centric.
  3. 3. Cloud Computing  With cloud computing, the software programs one use aren’t run from one’s personal computer, but are rather stored on servers accessed via the Internet.
  4. 4. Cloud Computing  If a computer crashes, the software is still available for others to use. Same goes for the documents one create; they’re stored on a collection of servers accessed via the Internet.  Anyone with permission can not only access the documents, but can also edit and collaborate on those documents in real time.  Unlike traditional computing, this cloud computing model isn’t PC-centric, it’s document-centric.
  5. 5. What Is Cloud Computing?  Key to the definition of cloud computing is the “cloud” itself. Here , the cloud is a large group of interconnected computers.  These computers can be personal computers or network servers; they can be public or private.  Access is via the Internet. Any authorized user can access these docs and apps from any computer over any Internet connection.
  6. 6. What Is Cloud Computing? This cloud of computers extends beyond a single company or enterprise. The applications and data served by the cloud are available to broad group of users, cross-enterprise and cross-platform.
  7. 7. key properties of cloud computing: Cloud Computing Is User Centric : Once as a user are connected to the cloud, whatever is stored there—documents, messages, images, applications, whatever—becomes authorized to the user access them. In addition, not only is the data, but one can also share it with others.
  8. 8. Cloud Computing Is Powerful:  Connecting hundreds or thousands of computers together in a cloud creates a wealth of computing power impossible with a single desktop PC. key properties of cloud computing
  9. 9. Cloud Computing Is Accessible: Because data is stored in the cloud, users can instantly retrieve more information from multiple repositories. We are not limited to a single source of data, as we do with a desktop PC.  Cloud Computing Is Intelligent:  With all the various data stored on the computers in a cloud,data mining and analysis are necessary to access that information in an intelligent manner.
  10. 10. Cloud Computing Is Programmable: Many of the tasks necessary with cloud computing must be automated. For example, to protect the integrity of the data, information stored on a single computer in the cloud must be replicated on other computers in the cloud. If that one computer goes offline, the cloud’s programming automatically redistributes that computer’s data to a new computer in the cloud.
  11. 11. Understanding Cloud Architecture: Individual users connect to the cloud from their own personal computers or portable devices, over the Internet. To these individual users, the cloud is seen as a single application, device, or document. The hardware in the cloud (and the operating system that manages the hardware connections) is invisible.
  12. 12. Conclusion  Thus cloud computing provide a super-computing power .This cloud of computers extends beyond a single company or enterprise.  The applications and data served by the cloud are available to broad group of users, cross-enterprise and cross-platform.
  13. 13. What is Commerce  According to Dictionary.com  Commerce is a division of trade or production which deals with the exchange of goods and services from producer to final consumer  It comprises the trading of something of economic value such as goods, services, information, or money between two or more entities
  14. 14. What is E-Commerce  Commonly known as Electronic Marketing.  “It consist of buying and selling goods and services over an electronic systems Such as the internet and other computer networks.”  “E-commerce is the purchasing, selling and exchanging goods and services over computer networks (internet) through which transaction or terms of sale are performed
  15. 15. Why use e-commerce?  LOW ENTRY COST  REDUCES TRANSACTION COSTS  ACCESS TO THE GLOBAL MARKET  SECURE MARKET SHARE
  16. 16. Brief History of E-Commerce  1970s: Electronic Funds Transfer (EFT)  Used by the banking industry to exchange account information over secured networks  Late 1970s and early 1980s: Electronic Data Interchange (EDI) for e-commerce within companies  Used by businesses to transmit data from one business to another  1990s: the World Wide Web on the Internet provides easy-to-use technology for information publishing and dissemination  Cheaper to do business (economies of scale)  Enable diverse business activities (economies of scope
  17. 17. The Process Of E-Commerce  A consumer uses Web browser to connect to the home page of a merchant's Web site on the Internet.  The consumer browses the catalog of products featured on the site and selects items to purchase. The selected items are placed in the electronic equivalent of a shopping cart.  When the consumer is ready to complete the purchase of selected items, she provides a bill-to and ship-to address for purchase and delivery
  18. 18. The Process Of E-Commerce  When the merchant's Web server receives this information, it computes the total cost of the order-- including tax, shipping, and handling charges--and then displays the total to the customer.  The customer can now provide payment information, such as a credit card number, and then submit the order.
  19. 19. The Process Of E-Commerce  When the credit card number is validated and the order is completed at the Commerce Server site, the merchant's site displays a receipt confirming the customer's purchase.  The Commerce Server site then forwards the order to a Processing Network for payment processing and fulfillment.
  20. 20. Types Of E-commerece  Business-to-business (B2B)  B2B stands for Business to Business. It consists of largest form of Ecommerce. This model defines that Buyer and seller are two different entities. It is similar to manufacturer issuing goods to the retailer or wholesaler.  E.g.:-Dell deals computers and other associated accessories online but it is does not make up all those products. So, in govern to deal those products, first step is to purchases them from unlike businesses i.e. the producers of those
  21. 21. Business-to-consumer (B2C):  It is the model taking businesses and consumers interaction. The basic concept of this model is to sell the product online to the consumers.  B2c is the direct trade between the company and consumers. It provides direct selling through online. For example: if you want to sell goods and services to customer so that anybody can purchase any products directly from supplier’s
  22. 22. Business-to-Employee (B2E)  Business-to-employee (B2E)  electronic commerce uses an intrabusiness network which allows companies to provide products and/or services to their employees. Typically, companies use B2E networks to automate employee-related corporate processes.
  23. 23. Consumer-to-consumer (C2C)  There are many sites offering free classifieds, auctions, and forums where individuals can buy and sell thanks to online payment systems like PayPal where people can send and receive money online with ease. eBay's auction service is a great example of where person-to-person transactions take place everyday since 1995.
  24. 24. PROS AND CONS OF E-COMMERCE  PROS (Advantages)  No checkout queues  Reduce prices  You can shop anywhere in the world  Easy access 24 hours a day  Wide selection to cater for all consumers
  25. 25. CONS (Disadvantages)  Unable to examine products personally  Not everyone is connected to the Internet  There is the possibility of credit card number theft  On average only 1/9th of stock is available on the net
  26. 26. Future of E-commerce in India  According to business world estimate near about Sixty thousand new jobs will be created for the internet world alone in the next two years  e-Commerce transactions are expected to cross the Rs. 3500 crore milestone in 2010-11, a jump of around 350 percent from the 2008-09 figure of Rs. 1000 crore  eBay said that consumers were trading goods worth almost three crore rupees everyday, across the globe.
  27. 27. M-Commerce  M-Commerce Definition  "Mobile Commerce is the use of information technologies and communication technologies for the purpose of mobile integration of different value chains an business processes, and for the purpose of management of business relationships.”
  28. 28. Life Cycle  Content provider can build its service using applications from multiple application developers and also can aggregate content from other content providers and can supply the aggregated content to a network operator or service provider.  Service providers can also act as content aggregators, but are unlikely to act as either an application or content provider due to their focus on the network and service aspects of m-commerce.  Wireless carriers can play a very active and important role in the mobile commerce applications and services due to the fact that mobile user is going through their network to perform all mobile commerce transactions.  Mobile user is likely to prefer a common bill for voice, data and mobile commerce services.
  29. 29. M-Commerce Emerging Applications  Mobile Financial Applications (MFA)  Mobile Advertising (MA)  Mobile Inventory Management (MIM)  Product Location and Search (PLS)
  30. 30. MFA (Mobile Financial Applications)  Mobile financial applications are likely to be one of the most important components of m-commerce.  They could involve a variety of applications such as mobile banking and brokerage service, mobile money transfer, and mobile payments.
  31. 31. MA (Mobile Advertising)  Mobile advertising is also a very important class of mobile commerce applications.  Using demographic information collected by wireless service providers and information on the current location of mobile users, much targeted advertising can be done.
  32. 32. MIM (Mobile Inventory Management)  This class of application involves location tracking of goods, services and even people.  The tracking of goods may help service providers in determining the time of delivery to customer, thus improving customer service and obtaining a competitive edge over other business.
  33. 33. PLS (Product Location & Search)  This class of application includes locating an item in a particular area or location.  This is concerned with finding an item with certain specifications and whether it is available in a specified area or not.
  34. 34. M-Commerce Applications  Mobile Ticketing.  Content Purchase and Delivery.  Location based services.  Information services.  Mobile Banking.
  35. 35. Advantages and Disadvantages  Providing wider reach.  Reducing time and order. • Small screens of most devices still limit types of file and data transfer (i.e. streaming videos, etc.) • Standards guiding applications and technology development and connection's) • WAP and SMS limited to small number of characters and text. • Use of graphics limited
  36. 36. What is a Firewall?  “A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer”
  37. 37. What is a Firewall?  The primary job of a firewall is to secure the inside network from the outside  All traffic between the network and the internet in either direction must pass through the firewall.  The firewall decides if the traffic can be allowed to flow , or whether it must be stopped from proceeding further
  38. 38. Firewall Rules:  Allow – traffic that flows automatically because it has been deemed as “safe” (Ex. Meeting Maker, Eudora, etc.)  Block – traffic that is blocked because it has been deemed dangerous to your computer  Ask – asks the user whether or not the traffic is allowed to pass
  39. 39. CHARACTERISTICS OF FIREWALL  All traffic from inside to outside , and vice versa must pass through the firewall  Only the traffic authorized as per the local security policy should be allowed to pass through  User control  Behavior control
  40. 40. Types of Firewall  NETWORK LAYER FIREWALLS:  Network layer firewalls generally make their decisions based on the source address, destination address and ports in individual IP packets. A simple router is the traditional network layer firewall, since it is not able to make particularly complicated decisions about what a packet is actually talking to or where it actually came from.
  41. 41. Types of Firewall  APPLICATION LAYER FIREWALLS :  Application layer firewalls defined, are hosts running proxy servers, which permit no traffic directly between networks, and they perform elaborate logging and examination of traffic passing through them
  42. 42. Types of Firewall  PROXY FIREWALLS: Proxy firewalls offer more security than other types of firewalls, but this is at the expense of speed and functionality, as they can limit which applications your network can support.
  43. 43. What is e-government?  Information or transactions provided on-line by local governments to citizens using the Internet and Web sites.  The complexity of Web sites ranges from those that merely provide information to others that allow electronic financial transactions  Examples: India (Andhraperdesh, Bangalore), Hong Kong, Singapore, Malaysia, Newzeland, Australia, UK, Germany and many states of USA
  44. 44. Definition Anonymous In an Electronic Government • There is no official seal / signature • There is no paper • There is no holiday • There is no division / section • There is no boundary of cities • There is no public office
  45. 45. Another definition  E-government consist of four areas of services  G2C- Government to Citizen  G2G- Government to Government  G2B- Government to Business  G2E- Government to Employee
  46. 46. G2C- Government to Citizen  All gov to citizen information should available online  News  All public-department interaction forms  On-line form submission  Transactions (payments)  Revenue collection, payment of utility bills  On-line complaints  Track & Trace System: e-citizen can trace all his own complaints and submitted cases and can get online updated info (case situation, any objection, rejection or approval)  Citizen Registration: Birth and marriage reg. ID Card, Domicile, Driving License, Job matching, Land use application
  47. 47. G2G- Government to Government  Inter-Departmental Interaction  Reporting, budgeting and planning to administrative, P&D and financial departments.  Interaction among multilevel governments  Local Governments, Provincial Governments and Federal Government  Notices, summaries and policies for different departments  Inspections, observations and inquires  Interaction between control offices and field offices
  48. 48. G2B- Government to Business e-Procurements  Tendering  Expression Of Interest  Request For Proposal  Technical Evaluation  Financial Evaluation  Contract Awarding or Purchase Order  NOC & Licenses  Cinema, petrol pump, etc.  Trade, Business and Industrial Policies  Guidelines for different businesses  Tax e Filing  Loaning: Application submission, inspection verification sanctioning using case management system and track and trace system
  49. 49. Primary Goals  Successful e-government should aim to meet three :  Improve the quality, cost, accessibility, and speed of delivering government information and services.  Make government more accountable by increasing the opportunity for citizen participation in the governance process and bringing citizens closer to elected officials and public servants.  Organize the production and distribution of public information and services in new ways, that is, to transform government services to meet citizens’ needs in an automated world.
  50. 50. Key Benefits of e-gov  Less expensive  e-Government transactions cost 65% less compared to ordinary transactions  More convenient hours 24 X 7  Reduced travel and waiting  Benefits all customers  No Geographical Boundaries  Reduction in bad check processing  Reduction of time to recognize money
  51. 51. E-Government  20% Technology  35% BPR (Business Process Reengineering)  40% Change Management  05% Luck!
  52. 52. References 1. http://en.wikipedia.org/wiki/Cloud_computing 2. http://dictionary.reference.com/browse/cloud+computing 3. http://www.inthergroup.com/references/e-commerce 4. https://sites.google.com/a/riologica.net/cloud-computing- references/ 5. http://www.reference.com/browse/e-commerce 6. http://cyber.law.harvard.edu/olds/ecommerce/library.html 7. http://www.vicomsoft.com/learning-center/firewalls/ 8. http://en.wikipedia.org/wiki/Firewall_(computing) 9. http://dictionary.reference.com/browse/firewall?s=t

×