...Angela Jiongco Chapter2 Review questions # 1 and # 5 Exercise # Review question #1. In one or two paragraphs, describe how the internet changed form a government research project into a technology for business users. The internet began as a way for the military to control weapons systems while under attack. In the 60’s, the U.S. Department of Defense became worried about possible effects of nuclear attack on its computing facilities. The Defense Department realized that in the future they need powerful computers for coordination and control. The Defense Department funded a research at leading universities and institute with the goal of designing a worldwide network that could remain operational even the network were sabotage by the military enemy. The researchers were determined the best solution to accomplishing their goal was to create networks that do not require a central computer control network operations. However, at the time the only network existed was a single connection between sender and receiver from the leased telephone company line. There was a concerned of risk using single connection method for connecting computers, so the researchers developed a different method in communication using multiple channels. In 1969 the Department of Defense researchers in the Advanced Research Projects Agency (ARPA) use this direct connection network model to connect four computers; one each at University of California at Los Angeles, SRI International, University of...
Words: 661 - Pages: 3
...MODELOS DE NEGOCIOS ELECTRÓNICOS B2B: NEGOCIO A NEGOCIO • • • Extranet Negocios en línea que venden a otros negocios. Incluye modelos como: lugares de mercado en la red (distribuidores electrónicos, compañías de adquisición de electrónicos, mercados de intercambio y consorcios industriales) y redes industriales privadas (redes de una sola empresa y redes a nivel empresarial). B2C: NEGOCIO A CONSUMIDOR • • Internet Negocios en línea que venden a consumidores individuales. Incluye modelos como: portales, tiendas de venta al detalle en línea, proveedores de contenido, corredores de transacciones, generador de mercado, proveedores de servicios y proveedores de comunidades virtuales. • B2E: NEGOCIO A EMPLEADOS • • • Intranet o Extranet Relación del negocio con los empleados. Útiles para trámites de vacaciones, recibos de nómica, préstamos, comunicación interna. Pueden significar grandes ahorros en tiempo y documentación. También pueden vender productos a sus empleados a precios especiales. B2S: BUSINESS TO SHAREHOLDER • • • Extranets Sirve como vinculo entre una empresa y sus accionistas. Entregan información sobre la situación de la empresa, pago de dividendos, ampliaciones de capital, nuevos desarrollos, reuniones de accionistas, nombramientos, etc. http://investor.google.com/ https://www.irtvazteca.com/ http://www.hsbc.com.mx/1/2/en/investor-relations • • • C2C: CONSUMIDOR A CONSUMIDOR • • • Internet Consumidores...
Words: 598 - Pages: 3
...Case Study: Amazon.com More than Your Average Bookstore 1. How has Amazon used technology to revamp the bookselling industry? Mainly use in the research engine of a website, it has comments and recommendations for buyers and give the idea of which book to buy. And the website can able to get the information of the customers’ interest of the book. Modify and evaluate the selling trend. 2. Is Amazon using disruptive or sustaining technology to run its business? Disruptive; this will bring more customers. 3. How is Amazon using intranets and extranets to run its business? Intranets: inside of the company, help the employee with the work; improve their communication and ability to work together. Extranets: outside of the company, corporate with other company and increase the market. 4. How could Amazon use kiosks to improve its business? A kiosk is a free website created by Amazon which can allow customers to access, research, buy and check out, which can improve the business. 5. What is Amazon’s e-business model? Business-to-Customer model; It sells product to customers via internet. Business-to-Business model; it does business with other business company. 6. How can Amazon use m-commerce to influence its business? Shopping by using mobile phones, customers can view all the products which Amazon offers, and buy them wherever they want only if they have internet access, this will make the shopping more convenient and quickly. 7. Which metrics could Amazon use to...
Words: 321 - Pages: 2
...Adoption of Electronic Commerce Technologies by SMEs in Malaysia Sherah Kurnia, Basil Alzougool, Mazen Ali Department of Information Systems, The University of Melbourne, Australia Emails: sherahk@unimelb.edu.au balzougool@pgrad.unimelb.edu.au mali@pgrad.unimelb.edu.au Saadat M. Alhashmi School of Information Technology Monash University Email: saadat.m.alhashmi@infotech.monash.edu.my Abstract Electronic commerce (EC) offers many benefits to organizations of any size including small to medium- sized enterprises (SMEs). At this stage, there is still a need for a better understanding of the potential and relevance of EC in developing countries as well as the behaviour of SMEs towards EC adoption. Moreover, there is still a need for a holistic view of how various widely known factors at the organization, industry and national levels affect EC adoption. Therefore, this study proposes a theoretical model of EC technologies adoption by SMEs in developing countries by incorporating various readiness factors identified in the literature that may determine EC technologies adoption by SMEs in developing countries. It then explores the influence of these factors on the adoption of different EC technologies. The environmental pressure is also considered in this study. Through a survey of SMEs within the grocery industry in Malaysia as an example of a developing country, the study demonstrates how various readiness factors influence the adoption of various EC technologies differently...
Words: 9310 - Pages: 38
...Programa
de
Fidelización
de
Clientes.
M
en
C.
Verónica
Rueda
Introducción
Desarrollar
un
Programa
de
Fidelización
puede
significar
retener
y
fidelizar
a
los
mejores
clientes
o
por
contra,
perderlos
por
no
poseer
una
buena
estrategia
definida
a
corto
y
largo
plazo.
2
Introducción
Hasta
hace
poco
todos
eran
offline,
poseían
catálogos
impresos
y
los
regalos
eran
invariantes
y
poco
específicos
a
las
necesidades
de
los
usuarios.
3
Diferentes
Words: 638 - Pages: 3
...CBC80001-FS1 A Complete System for Business Communications from Verizon and Cisco A Cisco Smart Business Communications System from Verizon offers everything you need for more secure voice and data networking. Start Your Business the Right Way Whether you are starting up or branching out, the Cisco Smart Business Communications System gives you an affordable, all-in-one solution. Built-in voice, messaging, and mobility features let you stay in touch with local, regional, and overseas suppliers easily and cost-effectively. Wired and wireless data networking supports all your business operations and data needs, enabling you to start your business as a paperless office. Simple, Secure, Complete The Cisco Smart Business Communications System is a complete solution that replaces your traditional telephone system. It also gives you highly secure Internet capabilities with a data network and wireless connectivity to support powerful business applications. Best of all, it’s easy to use. And when you are ready to add new users and new capabilities, the system can easily accommodate changes and upgrades. Hardware to Connect Phones and Computers At the heart of the solution is an intelligent IP network. Cisco offers a suite of proven, industry-leading products for wired and wireless voice and data communications. An all-in-one system combines connections to the public telephone network and the Internet with integrated network security, ports to plug in Cisco Unified IP phones and...
Words: 874 - Pages: 4
...Determining Databases and Data Communications BIS 320 August 11, 2014 Determining Databases and Data Communications In the first illustration, a marketing assistant for a consumer electronics company is responsible for the task of maintaining booths for trade shows from beginning to end and must resolve any related issues that may arise. There are many things that need to be kept track of including data related to the equipment received for trade shows. Situations such as these required detailed lists of all things involved. For example, the equipment related to the trade show booth would be kept in its own category where they would be listed individually in relation to their utilization purposes for the trade show. Other data would need to be recorded such as detailed information in relation to the condition of the items during the shipping process. The marketing assistant must ensure the booth and its display contents, are brought to their desired location in a timely fashion and taken back securely in order to assure their future use to the company. By having information such as postal tracking numbers, tabs can be kept on the dispatch and retrieval dates, hence being aware of the items locale at all times. Trade shows typically need certain tools for tracking and maintaining the information needed with relation to the equipment being used. A great initial option would be a program such as Excel, to track the necessary data. However, Excel may not be the most effective...
Words: 1026 - Pages: 5
...Extranet solution – CSR24 Kimberly Giunta IS535 April 10, 2011 Professor Missakian Table of Contents 1. Summary of research paper 2. Background of ABC Agency 3. Current business issues 4. Definition and history of the extranet 5. Proposed solution – CSR24 6. Recommendations 1. Topic of Research Paper This research paper will talk about introducing an extranet to enhance the current business options available to clients at an ABC Agency, an insurance brokerage firm. I will discuss the background of the firm, their current processes and their current and future goals. Implementation of a program called CSR24 will be discussed along with how it will benefit ABC Agency and service their clients to keep a competitive advantage in this ever changing market. “When a firm sustains profits that exceed the average for its industry, the firm is said to possess a competitive advantage over its rivals.” (Quick MBA, 2010) Lastly, this paper will give recommendations on the implementation of ABC Agencies extranet and how it will benefit them in the short and long run to meet the goals and objectives of the agency. 2. Background of ABC Agency ABC agency is an Insurance brokerage company that works with numerous insurance companies to find their clients the best insurance product for their needs. The agency offers insurance products for auto, home, life, health business and other types of markets as well. ABC Agency is the largest insurance agency...
Words: 1909 - Pages: 8
...Submitted: 31. October 2008 Prepared by: André Nordal Sylte University of the Sunshine Coast Word count: 1665 Executive summary This report, authorised by Justin Debuse in Introduction to ICT, BUS108, looks at ICT architecture and security in an organisation. This report found that the major security threats within an organisation’s ICT are; Cracking into an organisation’s wireless intranet in search for vital corporate information; Former employees accessing wireless intranets and extranets without authorization; Information sent via an extranet could be intercepted in its transit; Viruses and Trojans accidentally downloaded by employees and been spread around the LAN. Solutions to these threats are; WiFi protected access (WPA) password and hide the network; ICTs should be protected with a login screen for the users; To secure an extranet, organisations should use a virtual private network (VPN); Any organisation should provide basic training in how to detect viruses and Trojans. This is a proactive way to prevent an infection in a whole organisation’s LAN. This report also found that the major legal and ethical issues within an organisation’s ICT are; Employee monitored by computer technology and in the building; Privacy on e-mail stored on an organisation’s computer; Illegal and offensive use of an organisation’s computer. Solutions to these issues are; the organisations have to inform their...
Words: 2419 - Pages: 10
...Internet and an Intranet and an Extranet: These three systems include that they all connect a group of people in a network. They all allow data to be uploaded onto the network and also allow it to be downloaded. They use software and hardware to share data. But they have many differences. Here I mention some differences among the Internet and an Intranet and an Extranet….. Internet: ❖ The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite to serve billions of users worldwide. ❖ Internet is global communication accessed through the web. ❖ It is available to the public. ❖ Internet speed is slower than Intranet. ❖ Internet based information is not much secure. ❖ Diagram: [pic] Intranet: ❖ An intranet is a private computer network that uses Internet Protocol technologies to securely share any part of an organization's information or operational systems within that organization. ❖ Intranet is shared content accessed by members within a single organization. ❖ It is private network only available to selected users. ❖ An Intranet provides much high speed than the internet. ❖ Intranet based information is more secure than Internet ❖ Diagram: [pic] Extranet: ❖ An extranet is a private network that uses Internet protocols, network connectivity. An extranet can be viewed as part of a company's...
Words: 367 - Pages: 2
...Discussion Questions: 1. What is the business of Zappos and what are its critical success factors (CSF’s)? [lists] • Business: Largest Online Shoe Retailer with fast efficient order fulfillment. • CSF’s: o Operational Excellence. Primary focus is selling a wide variety of shoes, but also sell other goods such as handbags, clothes and accessories o Focus on customer satisfaction o 4 week Employee training, will full pay o Employee retention, Zappos offered the employees “the offer” after first week of training, which was a 3,000K payout if they chose to quit. o Stocking of a vast inventory of all makes, styles, colors, and sizes, displayed and sold through the enabling power of Web 2.0 o Focused on fast and accurate order processing and speedy delivery to the customer. Website orders are fulfilled fast and efficiently o Zappos owns warehouses and fulfillment centers with an excess or 3+ million shoes, handbags, clothing and accessories, offering the best selection of shoes available anywhere (one stop shop) o Uses eCommerce for the transaction between business to consumer o Best customer service experience, employing approximately 1,600 workers o Offers free delivery and returns as well as a guaranteed 4-day delivery window and a 365-day return guarantee. o Innovated Company that kept culture and work environment ‘fun’ and relaxed. 2. Please complete the following table. Identify the key information systems and the related IT infrastructure investments that...
Words: 832 - Pages: 4
...2.1 Intranet: this is a privately accessible infrastructure of cables, routers, and various servers, in most cases it is limited to one company or an organization or a group of companies, like the Internet, an Internet is used to carry a wide range of services. 2.2 Extranet: they too like intranets are privately owned wide area networks, which are generally owned by an organization or a company, however they differ from intranets in the sense that the owner of an extranet charges a specific fee to those who may require access to it or they can access the information provided on the extranet if they are given authorization by an organsiation. Furthermore an extranet, is also used to carry a wide range of services like the Internet. 2.3 Smartphone: this is a mobile phone which has an advanced mobile operating system, to which combines features of personal computer operating system. It has a mobile system environment, connected to the Wi-Fi which is connected to the Internet and has basic computer functions, iOS, some smartphones have a touchscreen display. An environment for applications to be created by an individual user of application developer, the user has a variety of applications...
Words: 550 - Pages: 3
...Internet, Intranet, Extranet and Relation to Widgets Company: WUSA and their customers are located within the united states with their few other branches located in other countries and are dependable upon intranet, extranet and internet to share or transfer their information or communicate with their employees, suppliers or external vendors etc. All three, Internet, intranet and extranet uses the similar technologies to the world wide web and they make use of TCP/IP protocols, web pages and web browsers for their access. Intranets and extranets operate similarly to the internet. The main objective for the WUSA and WRU Company is to securely transmit Data through firewall security and limit access to internal data while also authenticating users. Setting up these networks is very easy process. 2. Network Integration(Hardware and software equip) and...
Words: 632 - Pages: 3
...of TCP/IP which doesn’t contain any way of specifying a bandwidth requirement; this is what leads to packet loss. Once enough packet loss has occurred, it makes it impossible to hold a conversation because the other end isn’t getting the message. This then leads the caller or receiver having to wait until the internet traffic reduces in order to re-establish the connection; this can obviously be very costly for businesses that rely on telecommunications to do business. A way to overcome this problem is by allowing an outside business, person, vendor, etc. to access your organization’s extranet. An extranet according to Techopedia “is a controlled private network allowing customers, partners, vendors, suppliers and other businesses to gain information, typically about a specific company or educational institution, and do so without granting access to the organization’s entire network. An extranet is often a private part of a website. It is restricted to select users through user IDs, passwords, and other authentication mechanisms on a login page (Janssen, 2012).” In other words, it allows outsiders to...
Words: 714 - Pages: 3
...Canada, determined the need to provide faster access for brokers. Outside brokers relied on fax, phone and postal service for policy information requests and agent offices connected to the headquarters via 56-kbps frame relay. Thus, ING implemented an extranet solution using the Internet to connect external brokers and agent offices that lowered response times from hours to under a minute. This solution raises many questions concerning use of the Internet as part of its business solution. ING’s decision to facilitate use of the Internet for business operations poses many probable difficulties and risks. Use of an extranet can introduce an organization to unacceptable risks to its internal data and information systems. For example, allowing access to internal databases through an extranet webserver increases the opportunity for attackers to breach the network for several reasons. In ING’s case, it uses two Windows NT servers to provide web services protected by a single hardware firewall. Multiple brokers connect to ING through web services, causing multiple simultaneous openings in the firewall. Attackers can employ a port scanner to scan for open ports with known exploits to gain access. Furthermore, too many open extranet connections also create multiple entry points for viruses or other malicious code to infiltrate the network and cause damage. Another potential entry point for a security breach can originate from a broker’s own computer. Although it wasn’t stated...
Words: 444 - Pages: 2