SlideShare a Scribd company logo
1 of 33
University of Barisal
Department of
management studies
Electronic Business
M M Nayon
21 MGT 048
Md Sabuj
21 MGT 050
Hasibur Rahman Shake
21 MGT 049
Farhan Shakhowat
21 MGT 051
Sayeda Akter
21 MGT 052
Mst Ferdauce Akter Sumi
21 MGT 053
M M Nayon
21 MGT 048
My Presentation Topic:
E-business analysis and process modeling.
Definition Of E-Business Analysis
E-business analysis and design refer to the systematic process of understanding,
evaluating, and planning the development or enhancement of electronic business
systems. It involves identifying business requirements, analyzing processes, and
designing solutions to improve the efficiency, effectiveness, and overall performance
of an organization's electronic business operations.
E-Business Process Modeling
E-business process modeling is the practice of representing the flow of
activities, information, and resources within an electronic business
environment using various modeling techniques and notations. It
involves creating visual diagrams that illustrate the steps, interactions,
and dependencies of processes involved in conducting business online.
Here's a more detailed look at e-business process modeling:
1. Purpose Of E-Business Process Modeling: Understanding Business Operations:
Process modeling helps stakeholders gain a clear understanding of how different tasks,
activities, and data interconnect in an e-business.
2. Common E-business Process Modeling Techniques: BPMN (Business Process Model
and Notation): BPMN is a widely used standard for modeling business processes,
including e-business processes. It offers a comprehensive set of graphical symbols to
represent activities, events, gateways, and flows.
3. Steps in E-business Process Modeling: Identify the Scope: Define the boundaries of
the e-business process to be modeled and the specific objectives of the modeling
effort.
4. Benefits of E-business Process Modeling: Improved understanding and visualization
of e-business processes, enhanced process efficiency and productivity, effective
communication among stakeholders.
Hasibur Rahman Shake
21 MGT 049
TASK ANALYSIS
Task analysis is the process of learning about ordinary users
by observing them in action to understand in detail how
they perform their tasks and achieve their intended goals.
Tasks analysis helps identify the tasks that your website and
applications must support and can also help you refine or
re-define your site’s navigation or search by determining
the appropriate content scope.
Task Analysis Process
Task analysis helps you understand:
•What your users’ goals are; what they are trying to achieve
•What users actually do to achieve those goals
•What experiences (personal, social, and cultural) users bring to the
tasks
•How users are influenced by their physical environment
•How users’ previous knowledge and experience influence:
• How they think about their work
• The workflow they follow to perform their tasks
Types of Task Analysis
There are several types of task analysis but among the
most common techniques used are:
•Cognitive Task Analysis is focused on understanding
tasks that require decision-making, problem-solving,
memory, attention and judgement.
•Hierarchical Task Analysis is focused on decomposing a
high-level task subtasks.
Task Decomposition
A task decomposition describes a particular task and then
decomposes it to describe the task's features, such as devices and
interface components used, duration, errors, and feedback. These
categories will be selected by the analyst based on the needs of the
analysis.
For example, you could break it down into product development,
branding, and marketing. Break these down into smaller chunks:
Break each deliverable into smaller, more manageable chunks. For
example, marketing could be broken down into SEO content strategy,
social media, and email marketing.
Process Dependencies
Process dependency analysis enables us to describe
interdependence between processes based on
information, materials or other resources in specific states,
and to describe the influence of time events on the
execution of processes.
Md Sabuj
21 MGT 050
Validating a new process model
Validating a new process model is a
critical step in ensuring its
effectiveness and efficiency. This
involves testing the model under
different scenarios to identify any
potential flaws or weaknesses that
may need to be addressed. This
allows for the identification of any
issues before implementing the
model in a live system.
Data modelling
Data modeling is the process of creating a visual
representation of data and its relationships to other
data. It is an important step in designing a database or
information system, as it helps to ensure that the data is
organized efficiently and accurately.
There are several different types of data models,
including conceptual, logical, and physical models. The
conceptual model focuses on the overall structure of the
data, while the logical model goes into more detail
about the relationships between entities and attributes.
1. Identify entities.
2. Identify attributes for entities.
3. Identify relationship between entities.
Data modelling process
Design for E-business
Designing for e-business requires a deep
understanding of the unique challenges and
opportunities presented by the digital landscape.
One of the key considerations is ensuring that the
user experience is seamless and intuitive, regardless
of the device or platform being used. This requires
careful attention to information architecture,
navigation, and visual design.
Architectural design of e business systems
The architectural design of e-business
systems is a complex process that requires
careful consideration of various factors.
One important factor to consider is the
scalability of the system. As the business
grows, the system should be able to
handle increased traffic and data volume
without sacrificing performance or
reliability.
Farhan Shakhowat
21 MGT 051
Designing the information architecture
of a website is a crucial step in creating
a user-friendly and efficient digital
experience. It involves organizing the
content, navigation, and functionality
of the site in a way that makes sense to
the user. This helps users quickly find
what they are looking for and navigate
through the site with ease.
Designing the information architecture
Information architecture:
The combination of organization, labelling and
navigation schemes composing an information system.
Site map:
A graphical or text depiction of the
relationship between different groups of content on
a website
Card sorting or web classification:
The process of arranging a way of organizing
objects on the website in a consistent manner.
In order to design a successful website,
it is important to keep the customer at
the forefront of your mind. This means
focusing on their needs and
preferences, rather than simply trying
to create something that looks good or
is easy for you to manage. By taking a
customer-oriented approach, you can
ensure that your site is user-friendly
and meets the needs of your target
audience.
Customer Orientation
Customer Orientation elements
• Small office and home users
• Small business
• Medium businesses
• Large business
• Government organizations
A successful website design is
the result of careful planning
and execution. When designing
a website, it is important to
consider both the aesthetic and
functional elements that make
up the user experience.
One major element of site
design is the use of color. Color
can be used to create contrast,
highlight important
information, and evoke
emotions in users.
Elements of site design
Elements of site design
1.Site personality
2.Site organization
3.Site navigation
4.Page design
Mst. Sayeda Akter
21 MGT 052
Security Design for E-business
Security for E-business
• Security for e-business refers to the measures and practices implemented
to protect an electronic business platform from potential threats,
vulnerabilities, and attacks.
• The main concern of security is “information security” : both customers
and internal company data.
⚠️Common security threats for e-
business
• Direct data access(and theft) : if data exist, they can potentially be
viewed or extracted. Avoid storing data that you don’t need on the website
- for example, some data relating to payment card should never be stored.
• Insecure payment systems: weak encryption or improper handling of payment
data can expose customers' financial information to cybercriminals.
• Phishing attack :phishing attacks are the practice of sending fraudulent
communications that appear to come from a reputable source. It is usually done
through email.
• Insecure authentication and authorization: poorly implemented authentication
and authorization mechanisms can make it easier for attackers to gain unauthorized
access to user accounts or sensitive areas of the website.
• Malicious file execution: it occurs when websites and web applications are not
properly validated.
Protecting computer system against
viruses:
• All organizations and individuals require a policy to combat the potential
impact of viruses. There are two approaches that can combined to counter
viruses. They are-
• Using right tools:
1) anti virus software.
2) managed e-mail service.
• Educating staff to change practices :
1.don’t open attachment to email from people you don’t know.
2.Download software only from the official source. Always check for virus
before installing.
3.Turn off macros in word or excel unless you use them regularly
4.Backup important files daily.
Mst Ferdauce Akter Sumi
21 MGT 053
E-mail Management
Email management is the skill of
efficiently handling and organizing
emails. It involves categorizing
messages, responding promptly, and
keeping the inbox organized. This helps
to save time, reduce stress, and improve
productivity in handling email
communication.
Hacking
Hacking refers to the act of gaining
unauthorized access to computer
systems, networks, or software, often
with the intent of manipulating,
stealing data, or causing disruption.
There are two types of hacking
1.Ethical hacking and
2.unethical hacking
Secure e-commerce transactions
Secure e-commerce transactions
involve secure payment gateways,
data privacy, and strong
authentication methods like multi-
factor authentication. Regular
security audits and updates are
crucial to mitigate risks and
protect customer data.
Current approaches to e-commerce security
There are many approaches to
e-commerce security. These are
major Securities. Two-Factor
Authentication (2FA)Regular
security audits Secure payment
gateways Data encryption

More Related Content

Similar to Group-08.pptx

Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxgalerussel59292
 
Course Description The design of computer based information sy.docx
 Course Description The design of computer based information sy.docx Course Description The design of computer based information sy.docx
Course Description The design of computer based information sy.docxaryan532920
 
Information Architecture Development
Information Architecture DevelopmentInformation Architecture Development
Information Architecture DevelopmentAchmad Solichin
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3Home
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notesedwinlorenzana
 
11.online library management system
11.online library management system11.online library management system
11.online library management systemPvrtechnologies Nellore
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industrySouvik Chakraborty
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industrySouvik Chakraborty
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)Gord Reynolds
 
Methods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdfMethods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdfJonathanCovena1
 
Information Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentationInformation Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentationChristopher Wynder
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemMaria Stella Solon
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2Neelam Rawat
 
Embedded Analytics
Embedded AnalyticsEmbedded Analytics
Embedded AnalyticsMITSDEDistance
 
Application of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesApplication of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesYogeshIJTSRD
 
SAD_UnitII.docx
SAD_UnitII.docxSAD_UnitII.docx
SAD_UnitII.docx8759000398
 

Similar to Group-08.pptx (20)

Assessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docxAssessment 2DescriptionFocusEssayValue50Due D.docx
Assessment 2DescriptionFocusEssayValue50Due D.docx
 
Course Description The design of computer based information sy.docx
 Course Description The design of computer based information sy.docx Course Description The design of computer based information sy.docx
Course Description The design of computer based information sy.docx
 
E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
Information Architecture Development
Information Architecture DevelopmentInformation Architecture Development
Information Architecture Development
 
Report
ReportReport
Report
 
Business Intelligence Module 3
Business Intelligence Module 3Business Intelligence Module 3
Business Intelligence Module 3
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
11.online library management system
11.online library management system11.online library management system
11.online library management system
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
 
Bi in financial industry
Bi in financial industryBi in financial industry
Bi in financial industry
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Methods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdfMethods for analysis and design of an information system.pdf
Methods for analysis and design of an information system.pdf
 
Information Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentationInformation Management aaS AIIM First Canadian presentation
Information Management aaS AIIM First Canadian presentation
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Unit 1 & 2
Unit 1 & 2Unit 1 & 2
Unit 1 & 2
 
Management ( Six Business Objectives)
Management ( Six Business Objectives)Management ( Six Business Objectives)
Management ( Six Business Objectives)
 
Embedded Analytics
Embedded AnalyticsEmbedded Analytics
Embedded Analytics
 
Application of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative ServicesApplication of Savings and Loan Cooperative Services
Application of Savings and Loan Cooperative Services
 
SAD_UnitII.docx
SAD_UnitII.docxSAD_UnitII.docx
SAD_UnitII.docx
 

More from MohammedDostogirAlam (19)

Group-11.pptx
Group-11.pptxGroup-11.pptx
Group-11.pptx
 
Group-2.pptx
Group-2.pptxGroup-2.pptx
Group-2.pptx
 
Group-6.pptx
Group-6.pptxGroup-6.pptx
Group-6.pptx
 
Group-4.pptx
Group-4.pptxGroup-4.pptx
Group-4.pptx
 
e-business-and-e-commerce.ppt
e-business-and-e-commerce.ppte-business-and-e-commerce.ppt
e-business-and-e-commerce.ppt
 
Chapter 3 .pptx
Chapter 3 .pptxChapter 3 .pptx
Chapter 3 .pptx
 
Group -05.pptx
Group -05.pptxGroup -05.pptx
Group -05.pptx
 
Group- 12.pptx
Group- 12.pptxGroup- 12.pptx
Group- 12.pptx
 
Untitled presentation(2).pptx
Untitled presentation(2).pptxUntitled presentation(2).pptx
Untitled presentation(2).pptx
 
Group-10 .pptx
Group-10 .pptxGroup-10 .pptx
Group-10 .pptx
 
Group-7 .pptx
Group-7 .pptxGroup-7 .pptx
Group-7 .pptx
 
Group-9.pptx
Group-9.pptxGroup-9.pptx
Group-9.pptx
 
GROUP_01 (Update).pptx
GROUP_01 (Update).pptxGROUP_01 (Update).pptx
GROUP_01 (Update).pptx
 
Group-01 .pptx
Group-01 .pptxGroup-01 .pptx
Group-01 .pptx
 
Group -4 .pptx
Group -4 .pptxGroup -4 .pptx
Group -4 .pptx
 
Group-03.pptx
Group-03.pptxGroup-03.pptx
Group-03.pptx
 
21 MGT 016.pptx
21 MGT 016.pptx21 MGT 016.pptx
21 MGT 016.pptx
 
Group-03.pptx
Group-03.pptxGroup-03.pptx
Group-03.pptx
 
21 MGT 016.pptx
21 MGT 016.pptx21 MGT 016.pptx
21 MGT 016.pptx
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Group-08.pptx

  • 1. University of Barisal Department of management studies Electronic Business
  • 2. M M Nayon 21 MGT 048 Md Sabuj 21 MGT 050 Hasibur Rahman Shake 21 MGT 049 Farhan Shakhowat 21 MGT 051 Sayeda Akter 21 MGT 052 Mst Ferdauce Akter Sumi 21 MGT 053
  • 3. M M Nayon 21 MGT 048 My Presentation Topic: E-business analysis and process modeling.
  • 4. Definition Of E-Business Analysis E-business analysis and design refer to the systematic process of understanding, evaluating, and planning the development or enhancement of electronic business systems. It involves identifying business requirements, analyzing processes, and designing solutions to improve the efficiency, effectiveness, and overall performance of an organization's electronic business operations. E-Business Process Modeling E-business process modeling is the practice of representing the flow of activities, information, and resources within an electronic business environment using various modeling techniques and notations. It involves creating visual diagrams that illustrate the steps, interactions, and dependencies of processes involved in conducting business online.
  • 5. Here's a more detailed look at e-business process modeling: 1. Purpose Of E-Business Process Modeling: Understanding Business Operations: Process modeling helps stakeholders gain a clear understanding of how different tasks, activities, and data interconnect in an e-business. 2. Common E-business Process Modeling Techniques: BPMN (Business Process Model and Notation): BPMN is a widely used standard for modeling business processes, including e-business processes. It offers a comprehensive set of graphical symbols to represent activities, events, gateways, and flows. 3. Steps in E-business Process Modeling: Identify the Scope: Define the boundaries of the e-business process to be modeled and the specific objectives of the modeling effort. 4. Benefits of E-business Process Modeling: Improved understanding and visualization of e-business processes, enhanced process efficiency and productivity, effective communication among stakeholders.
  • 7. TASK ANALYSIS Task analysis is the process of learning about ordinary users by observing them in action to understand in detail how they perform their tasks and achieve their intended goals. Tasks analysis helps identify the tasks that your website and applications must support and can also help you refine or re-define your site’s navigation or search by determining the appropriate content scope.
  • 8. Task Analysis Process Task analysis helps you understand: •What your users’ goals are; what they are trying to achieve •What users actually do to achieve those goals •What experiences (personal, social, and cultural) users bring to the tasks •How users are influenced by their physical environment •How users’ previous knowledge and experience influence: • How they think about their work • The workflow they follow to perform their tasks
  • 9. Types of Task Analysis There are several types of task analysis but among the most common techniques used are: •Cognitive Task Analysis is focused on understanding tasks that require decision-making, problem-solving, memory, attention and judgement. •Hierarchical Task Analysis is focused on decomposing a high-level task subtasks.
  • 10. Task Decomposition A task decomposition describes a particular task and then decomposes it to describe the task's features, such as devices and interface components used, duration, errors, and feedback. These categories will be selected by the analyst based on the needs of the analysis. For example, you could break it down into product development, branding, and marketing. Break these down into smaller chunks: Break each deliverable into smaller, more manageable chunks. For example, marketing could be broken down into SEO content strategy, social media, and email marketing.
  • 11. Process Dependencies Process dependency analysis enables us to describe interdependence between processes based on information, materials or other resources in specific states, and to describe the influence of time events on the execution of processes.
  • 13. Validating a new process model Validating a new process model is a critical step in ensuring its effectiveness and efficiency. This involves testing the model under different scenarios to identify any potential flaws or weaknesses that may need to be addressed. This allows for the identification of any issues before implementing the model in a live system.
  • 14. Data modelling Data modeling is the process of creating a visual representation of data and its relationships to other data. It is an important step in designing a database or information system, as it helps to ensure that the data is organized efficiently and accurately. There are several different types of data models, including conceptual, logical, and physical models. The conceptual model focuses on the overall structure of the data, while the logical model goes into more detail about the relationships between entities and attributes.
  • 15. 1. Identify entities. 2. Identify attributes for entities. 3. Identify relationship between entities. Data modelling process
  • 16. Design for E-business Designing for e-business requires a deep understanding of the unique challenges and opportunities presented by the digital landscape. One of the key considerations is ensuring that the user experience is seamless and intuitive, regardless of the device or platform being used. This requires careful attention to information architecture, navigation, and visual design.
  • 17. Architectural design of e business systems The architectural design of e-business systems is a complex process that requires careful consideration of various factors. One important factor to consider is the scalability of the system. As the business grows, the system should be able to handle increased traffic and data volume without sacrificing performance or reliability.
  • 19. Designing the information architecture of a website is a crucial step in creating a user-friendly and efficient digital experience. It involves organizing the content, navigation, and functionality of the site in a way that makes sense to the user. This helps users quickly find what they are looking for and navigate through the site with ease. Designing the information architecture
  • 20. Information architecture: The combination of organization, labelling and navigation schemes composing an information system. Site map: A graphical or text depiction of the relationship between different groups of content on a website Card sorting or web classification: The process of arranging a way of organizing objects on the website in a consistent manner.
  • 21. In order to design a successful website, it is important to keep the customer at the forefront of your mind. This means focusing on their needs and preferences, rather than simply trying to create something that looks good or is easy for you to manage. By taking a customer-oriented approach, you can ensure that your site is user-friendly and meets the needs of your target audience. Customer Orientation
  • 22. Customer Orientation elements • Small office and home users • Small business • Medium businesses • Large business • Government organizations
  • 23. A successful website design is the result of careful planning and execution. When designing a website, it is important to consider both the aesthetic and functional elements that make up the user experience. One major element of site design is the use of color. Color can be used to create contrast, highlight important information, and evoke emotions in users. Elements of site design
  • 24. Elements of site design 1.Site personality 2.Site organization 3.Site navigation 4.Page design
  • 25. Mst. Sayeda Akter 21 MGT 052 Security Design for E-business
  • 26. Security for E-business • Security for e-business refers to the measures and practices implemented to protect an electronic business platform from potential threats, vulnerabilities, and attacks. • The main concern of security is “information security” : both customers and internal company data.
  • 27. ⚠️Common security threats for e- business • Direct data access(and theft) : if data exist, they can potentially be viewed or extracted. Avoid storing data that you don’t need on the website - for example, some data relating to payment card should never be stored. • Insecure payment systems: weak encryption or improper handling of payment data can expose customers' financial information to cybercriminals. • Phishing attack :phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. • Insecure authentication and authorization: poorly implemented authentication and authorization mechanisms can make it easier for attackers to gain unauthorized access to user accounts or sensitive areas of the website. • Malicious file execution: it occurs when websites and web applications are not properly validated.
  • 28. Protecting computer system against viruses: • All organizations and individuals require a policy to combat the potential impact of viruses. There are two approaches that can combined to counter viruses. They are- • Using right tools: 1) anti virus software. 2) managed e-mail service. • Educating staff to change practices : 1.don’t open attachment to email from people you don’t know. 2.Download software only from the official source. Always check for virus before installing. 3.Turn off macros in word or excel unless you use them regularly 4.Backup important files daily.
  • 29. Mst Ferdauce Akter Sumi 21 MGT 053
  • 30. E-mail Management Email management is the skill of efficiently handling and organizing emails. It involves categorizing messages, responding promptly, and keeping the inbox organized. This helps to save time, reduce stress, and improve productivity in handling email communication.
  • 31. Hacking Hacking refers to the act of gaining unauthorized access to computer systems, networks, or software, often with the intent of manipulating, stealing data, or causing disruption. There are two types of hacking 1.Ethical hacking and 2.unethical hacking
  • 32. Secure e-commerce transactions Secure e-commerce transactions involve secure payment gateways, data privacy, and strong authentication methods like multi- factor authentication. Regular security audits and updates are crucial to mitigate risks and protect customer data.
  • 33. Current approaches to e-commerce security There are many approaches to e-commerce security. These are major Securities. Two-Factor Authentication (2FA)Regular security audits Secure payment gateways Data encryption