3. M M Nayon
21 MGT 048
My Presentation Topic:
E-business analysis and process modeling.
4. Definition Of E-Business Analysis
E-business analysis and design refer to the systematic process of understanding,
evaluating, and planning the development or enhancement of electronic business
systems. It involves identifying business requirements, analyzing processes, and
designing solutions to improve the efficiency, effectiveness, and overall performance
of an organization's electronic business operations.
E-Business Process Modeling
E-business process modeling is the practice of representing the flow of
activities, information, and resources within an electronic business
environment using various modeling techniques and notations. It
involves creating visual diagrams that illustrate the steps, interactions,
and dependencies of processes involved in conducting business online.
5. Here's a more detailed look at e-business process modeling:
1. Purpose Of E-Business Process Modeling: Understanding Business Operations:
Process modeling helps stakeholders gain a clear understanding of how different tasks,
activities, and data interconnect in an e-business.
2. Common E-business Process Modeling Techniques: BPMN (Business Process Model
and Notation): BPMN is a widely used standard for modeling business processes,
including e-business processes. It offers a comprehensive set of graphical symbols to
represent activities, events, gateways, and flows.
3. Steps in E-business Process Modeling: Identify the Scope: Define the boundaries of
the e-business process to be modeled and the specific objectives of the modeling
effort.
4. Benefits of E-business Process Modeling: Improved understanding and visualization
of e-business processes, enhanced process efficiency and productivity, effective
communication among stakeholders.
7. TASK ANALYSIS
Task analysis is the process of learning about ordinary users
by observing them in action to understand in detail how
they perform their tasks and achieve their intended goals.
Tasks analysis helps identify the tasks that your website and
applications must support and can also help you refine or
re-define your site’s navigation or search by determining
the appropriate content scope.
8. Task Analysis Process
Task analysis helps you understand:
•What your users’ goals are; what they are trying to achieve
•What users actually do to achieve those goals
•What experiences (personal, social, and cultural) users bring to the
tasks
•How users are influenced by their physical environment
•How users’ previous knowledge and experience influence:
• How they think about their work
• The workflow they follow to perform their tasks
9. Types of Task Analysis
There are several types of task analysis but among the
most common techniques used are:
•Cognitive Task Analysis is focused on understanding
tasks that require decision-making, problem-solving,
memory, attention and judgement.
•Hierarchical Task Analysis is focused on decomposing a
high-level task subtasks.
10. Task Decomposition
A task decomposition describes a particular task and then
decomposes it to describe the task's features, such as devices and
interface components used, duration, errors, and feedback. These
categories will be selected by the analyst based on the needs of the
analysis.
For example, you could break it down into product development,
branding, and marketing. Break these down into smaller chunks:
Break each deliverable into smaller, more manageable chunks. For
example, marketing could be broken down into SEO content strategy,
social media, and email marketing.
11. Process Dependencies
Process dependency analysis enables us to describe
interdependence between processes based on
information, materials or other resources in specific states,
and to describe the influence of time events on the
execution of processes.
13. Validating a new process model
Validating a new process model is a
critical step in ensuring its
effectiveness and efficiency. This
involves testing the model under
different scenarios to identify any
potential flaws or weaknesses that
may need to be addressed. This
allows for the identification of any
issues before implementing the
model in a live system.
14. Data modelling
Data modeling is the process of creating a visual
representation of data and its relationships to other
data. It is an important step in designing a database or
information system, as it helps to ensure that the data is
organized efficiently and accurately.
There are several different types of data models,
including conceptual, logical, and physical models. The
conceptual model focuses on the overall structure of the
data, while the logical model goes into more detail
about the relationships between entities and attributes.
15. 1. Identify entities.
2. Identify attributes for entities.
3. Identify relationship between entities.
Data modelling process
16. Design for E-business
Designing for e-business requires a deep
understanding of the unique challenges and
opportunities presented by the digital landscape.
One of the key considerations is ensuring that the
user experience is seamless and intuitive, regardless
of the device or platform being used. This requires
careful attention to information architecture,
navigation, and visual design.
17. Architectural design of e business systems
The architectural design of e-business
systems is a complex process that requires
careful consideration of various factors.
One important factor to consider is the
scalability of the system. As the business
grows, the system should be able to
handle increased traffic and data volume
without sacrificing performance or
reliability.
19. Designing the information architecture
of a website is a crucial step in creating
a user-friendly and efficient digital
experience. It involves organizing the
content, navigation, and functionality
of the site in a way that makes sense to
the user. This helps users quickly find
what they are looking for and navigate
through the site with ease.
Designing the information architecture
20. Information architecture:
The combination of organization, labelling and
navigation schemes composing an information system.
Site map:
A graphical or text depiction of the
relationship between different groups of content on
a website
Card sorting or web classification:
The process of arranging a way of organizing
objects on the website in a consistent manner.
21. In order to design a successful website,
it is important to keep the customer at
the forefront of your mind. This means
focusing on their needs and
preferences, rather than simply trying
to create something that looks good or
is easy for you to manage. By taking a
customer-oriented approach, you can
ensure that your site is user-friendly
and meets the needs of your target
audience.
Customer Orientation
22. Customer Orientation elements
• Small office and home users
• Small business
• Medium businesses
• Large business
• Government organizations
23. A successful website design is
the result of careful planning
and execution. When designing
a website, it is important to
consider both the aesthetic and
functional elements that make
up the user experience.
One major element of site
design is the use of color. Color
can be used to create contrast,
highlight important
information, and evoke
emotions in users.
Elements of site design
24. Elements of site design
1.Site personality
2.Site organization
3.Site navigation
4.Page design
26. Security for E-business
• Security for e-business refers to the measures and practices implemented
to protect an electronic business platform from potential threats,
vulnerabilities, and attacks.
• The main concern of security is “information security” : both customers
and internal company data.
27. ⚠️Common security threats for e-
business
• Direct data access(and theft) : if data exist, they can potentially be
viewed or extracted. Avoid storing data that you don’t need on the website
- for example, some data relating to payment card should never be stored.
• Insecure payment systems: weak encryption or improper handling of payment
data can expose customers' financial information to cybercriminals.
• Phishing attack :phishing attacks are the practice of sending fraudulent
communications that appear to come from a reputable source. It is usually done
through email.
• Insecure authentication and authorization: poorly implemented authentication
and authorization mechanisms can make it easier for attackers to gain unauthorized
access to user accounts or sensitive areas of the website.
• Malicious file execution: it occurs when websites and web applications are not
properly validated.
28. Protecting computer system against
viruses:
• All organizations and individuals require a policy to combat the potential
impact of viruses. There are two approaches that can combined to counter
viruses. They are-
• Using right tools:
1) anti virus software.
2) managed e-mail service.
• Educating staff to change practices :
1.don’t open attachment to email from people you don’t know.
2.Download software only from the official source. Always check for virus
before installing.
3.Turn off macros in word or excel unless you use them regularly
4.Backup important files daily.
30. E-mail Management
Email management is the skill of
efficiently handling and organizing
emails. It involves categorizing
messages, responding promptly, and
keeping the inbox organized. This helps
to save time, reduce stress, and improve
productivity in handling email
communication.
31. Hacking
Hacking refers to the act of gaining
unauthorized access to computer
systems, networks, or software, often
with the intent of manipulating,
stealing data, or causing disruption.
There are two types of hacking
1.Ethical hacking and
2.unethical hacking
32. Secure e-commerce transactions
Secure e-commerce transactions
involve secure payment gateways,
data privacy, and strong
authentication methods like multi-
factor authentication. Regular
security audits and updates are
crucial to mitigate risks and
protect customer data.
33. Current approaches to e-commerce security
There are many approaches to
e-commerce security. These are
major Securities. Two-Factor
Authentication (2FA)Regular
security audits Secure payment
gateways Data encryption